Impact
The vulnerability is a null pointer dereference triggered within the RANConfiguration function of the ngap/handler.go file when an attacker crafts a malformed message. This flaw can cause the amf service to crash or become unresponsive, leading to a denial of service for users relying on the 5G core network. The patch does not provide evidence of code execution or privilege escalation.
Affected Systems
Omec‑project amf versions up to and including 2.1.3‑dev are affected. Upgrading to release 2.2.0 removes the flaw by adding proper null checks before processing RANConfiguration data.
Risk and Exploitability
This issue carries a CVSS score of 5.3, indicating moderate severity. No EPSS score is available and the vulnerability is not listed in CISA’s KEV catalog. The description states that the exploit can be launched remotely and that a public exploit has been released, so an attacker can remotely send a crafted NGAP packet to trigger the crash without additional access.
OpenCVE Enrichment