CVE-2023-37018
Published: 22 January 2025
Summary
CVE-2023-37018 is a high-severity Reachable Assertion (CWE-617) vulnerability in Open5Gs Open5Gs. Its CVSS base score is 8.6 (High).
Operationally, ranked in the top 46.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates incoming S1AP packets, such as UE Capability Info Indication, to ensure required fields like MME_UE_S1AP_ID are present, preventing the assertion failure from malformed ASN.1 input.
Ensures secure error handling during ASN.1 parsing over the S1AP interface to avoid crashing the MME process when encountering malformed packets.
Implements denial-of-service protections on the S1AP interface, such as rate limiting and resource controls, to mitigate repeated malformed packet transmissions causing MME crashes.
NVD Description
Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Capability Info Indication` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash…
more
the MME, resulting in denial of service.
Deeper analysisAI
CVE-2023-37018 is a vulnerability in Open5GS Mobility Management Entity (MME) versions up to and including 2.6.4. It involves a reachable assertion (CWE-617) that can be remotely triggered by a malformed ASN.1 packet over the S1AP interface. An attacker sends a UE Capability Info Indication message missing the required MME_UE_S1AP_ID field, causing the assertion to fail.
The vulnerability has a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H), indicating high severity due to network accessibility, low attack complexity, no privileges or user interaction required, changed scope, and high availability impact. Any unauthenticated remote attacker with access to the S1AP interface can exploit it by transmitting the malformed message, crashing the MME process. Repeated exploitation results in sustained denial of service against the MME.
Mitigation details are available in the advisory published at https://cellularsecurity.org/ransacked.
Details
- CWE(s)