Description
Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing malformed UL NAS Transport NAS messages without a Request Type. An attacker able to send crafted NAS messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 adds a guard when receiving an UL NAS Message without a Request Type given no SM Context.
Published: 2026-03-23
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

Ella Core is a 5G core designed for private networks. A flaw causes the core to crash when it receives malformed UL NAS Transport messages that do not include a Request Type. The crash terminates critical processing, leaving all connected subscribers without service and creating a denial of service. The weakness is a classic null pointer dereference mapped to CWE‑476, and no authentication is needed to trigger it.

Affected Systems

All deployments of Ellanetworks:core running a pre‑1.6.0 release are affected. The CPE identifier for Ella Core identifies these releases. From version 1.6.0 onward a guard was added that prevents the crash even when a UL NAS message lacks a Request Type.

Risk and Exploitability

The vulnerability carries a moderate severity rating of 6.5. An estimated exploitation likelihood is below 1%, and it is not listed in the CISA Known Exploited Vulnerabilities catalogue. An attacker can reach the vulnerable component by sending crafted NAS messages over the network, which does not require privilege or authentication. While the probability of exploitation is low, any successful exploitation would result in a complete outage of the 5G core and could seriously disrupt services that depend on it.

Generated by OpenCVE AI on March 24, 2026 at 20:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ella Core to version 1.6.0 or later.
  • Deploy network filtering to drop malformed UL NAS Transport messages that lack a Request Type if you cannot upgrade immediately.
  • After applying the fix, verify that the core processes NAS messages normally and monitor traffic for abnormal patterns.

Generated by OpenCVE AI on March 24, 2026 at 20:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3366-gw57-fcm5 Ella Core panics on malformed ULNASTransport Message without a Request Type
History

Wed, 25 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Ellanetworks ella Core
CPEs cpe:2.3:a:ellanetworks:ella_core:*:*:*:*:*:*:*:*
Vendors & Products Ellanetworks ella Core

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Ellanetworks
Ellanetworks core
Vendors & Products Ellanetworks
Ellanetworks core

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing malformed UL NAS Transport NAS messages without a Request Type. An attacker able to send crafted NAS messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 adds a guard when receiving an UL NAS Message without a Request Type given no SM Context.
Title Ella Core panics on malformed ULNASTransport Message without a Request Type
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Ellanetworks Core Ella Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T15:12:39.668Z

Reserved: 2026-03-18T18:55:47.425Z

Link: CVE-2026-33283

cve-icon Vulnrichment

Updated: 2026-03-24T14:12:40.914Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T00:16:30.530

Modified: 2026-03-24T19:30:01.170

Link: CVE-2026-33283

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:27:50Z

Weaknesses