Description
Ella Core is a 5G core designed for private networks. Prior to version 1.8.0, the PUT /api/v1/subscriber/{imsi} API accepts an IMSI identifier from both the URL path and the JSON request body but never verifies they match. This allows an authenticated NetworkManager to modify any subscriber's policy while the audit trail records a fabricated or unrelated subscriber IMSI. This issue has been patched in version 1.8.0.
Published: 2026-04-02
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Audit Log Falsification
Action: Apply Patch
AI Analysis

Impact

Ella Core’s PUT /api/v1/subscriber/{imsi} endpoint accepts an IMSI value from both the URL path and the JSON request body but never verifies that the two match. An authenticated NetworkManager can therefore modify any subscriber’s policy while the audit trail records a fabricated or unrelated subscriber IMSI, allowing policy changes to go unnoticed and compromising the integrity of the system’s audit logging.

Affected Systems

The vulnerability affects Ella Networks Ella Core, a 5G core designed for private networks. All releases before version 1.8.0 are impacted; the issue is resolved in version 1.8.0 and later. The patch is available in the v1.8.0 release and is documented in the official advisories.

Risk and Exploitability

The CVSS score of 2.7 denotes low severity, and the EPSS score of less than 1 % suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access as a NetworkManager, so the threat is limited to users with elevated privileges, but the ability to falsify audit logs could undermine trust in compliance and forensic investigations.

Generated by OpenCVE AI on April 7, 2026 at 23:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ella Core to version 1.8.0 or later to apply the audit log verification fix.
  • If an immediate upgrade is not feasible, restrict NetworkManager privileges and review audit logs for inconsistencies.
  • Verify that audit trail entries match subscriber IMSI values after applying the patch.

Generated by OpenCVE AI on April 7, 2026 at 23:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xw45-cc32-442f Ella Core Has Audit Log Falsification via Path/Body IMSI Mismatch in UpdateSubscriber
History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Ellanetworks ella Core
CPEs cpe:2.3:a:ellanetworks:ella_core:*:*:*:*:*:*:*:*
Vendors & Products Ellanetworks ella Core

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ellanetworks
Ellanetworks core
Vendors & Products Ellanetworks
Ellanetworks core

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description Ella Core is a 5G core designed for private networks. Prior to version 1.8.0, the PUT /api/v1/subscriber/{imsi} API accepts an IMSI identifier from both the URL path and the JSON request body but never verifies they match. This allows an authenticated NetworkManager to modify any subscriber's policy while the audit trail records a fabricated or unrelated subscriber IMSI. This issue has been patched in version 1.8.0.
Title Ella Core Has Audit Log Falsification via Path/Body IMSI Mismatch in UpdateSubscriber
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Ellanetworks Core Ella Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T15:39:50.305Z

Reserved: 2026-03-30T19:17:10.225Z

Link: CVE-2026-34762

cve-icon Vulnrichment

Updated: 2026-04-03T15:39:47.283Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T20:16:25.947

Modified: 2026-04-07T16:51:09.760

Link: CVE-2026-34762

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:54:26Z

Weaknesses