Description
Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a PathSwitchRequest containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings, resulting in a denial of service. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. This vulnerability is fixed in 1.5.1.
Published: 2026-03-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

Ella Core is a 5G core network implementation that processes NGAP messages. The vulnerability is triggered when a PathSwitchRequest contains UE Security Capabilities with zero‑length NR encryption or integrity protection algorithm bitstrings. The AMF process panics, causing a crash that results in denial of service for all connected subscribers. The weakness corresponds to an out‑of‑bounds read (CWE‑125). No authentication is required to send the crafted NGAP message, so the attack can be performed by any entity capable of sending NGAP traffic to the network.

Affected Systems

All deployments of Ella Core prior to version 1.5.1 are affected. The impacted product is listed in the CPE string cpe:2.3:a:ellanetworks:ella_core:*:*:*:*:*:*:*:*. Operators using ellanetworks:core without upgrading to 1.5.1 or newer are exposed to this flaw.

Risk and Exploitability

The CVSS base score is 6.5, indicating medium severity. The EPSS score is less than 1 %, suggesting a low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. However, because the exploit does not require authentication and relies on a simple, malformed NGAP message, the potential impact of a successful exploit is significant, as a single attack can disrupt services for an entire private 5G network. Operators should treat this as a medium to high risk depending on the exposure of their NGAP interfaces.

Generated by OpenCVE AI on March 19, 2026 at 15:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ella Core to version 1.5.1 or later.

Generated by OpenCVE AI on March 19, 2026 at 15:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j478-p7vq-3347 Ella Core: AMF DoS via malformed PathSwitchRequest with empty NR security capability bitstrings
History

Thu, 19 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Ellanetworks ella Core
CPEs cpe:2.3:a:ellanetworks:ella_core:*:*:*:*:*:*:*:*
Vendors & Products Ellanetworks ella Core

Sat, 14 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Ellanetworks
Ellanetworks core
Vendors & Products Ellanetworks
Ellanetworks core

Thu, 12 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a PathSwitchRequest containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings, resulting in a denial of service. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. This vulnerability is fixed in 1.5.1.
Title Ella Core: AMF DoS via malformed PathSwitchRequest with empty NR security capability bitstrings
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Ellanetworks Core Ella Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-14T03:46:29.938Z

Reserved: 2026-03-11T21:16:21.661Z

Link: CVE-2026-32320

cve-icon Vulnrichment

Updated: 2026-03-14T03:46:25.703Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:42.450

Modified: 2026-03-19T13:38:45.690

Link: CVE-2026-32320

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T10:00:04Z

Weaknesses