Cyber Posture

CVE-2023-37024

HighPublic PoC

Published: 21 January 2025

Published
21 January 2025
Modified
03 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0044 63.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-37024 is a high-severity Reachable Assertion (CWE-617) vulnerability in Linuxfoundation Magma. Its CVSS base score is 7.5 (High).

Operationally, ranked in the top 36.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates incoming NAS packets, including the Emergency Number List Information Element, to prevent processing malformed inputs that trigger the reachable assertion.

prevent

Ensures error handling for invalid Emergency Number List IEs in NAS packets does not result in MME crashes via assertion failures.

prevent

Remediates the specific assertion vulnerability by installing the Magma v1.9 patch that fixes the flaw in MME NAS packet processing.

NVD Description

A reachable assertion in the Mobile Management Entity (MME) of Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows remote attackers to crash the MME with an unauthenticated cellphone by sending a NAS packet containing an `Emergency Number List`…

more

Information Element.

Deeper analysisAI

CVE-2023-37024 is a reachable assertion vulnerability (CWE-617) in the Mobile Management Entity (MME) component of Magma versions up to and including 1.8.0. The flaw allows remote attackers to trigger an assertion failure by sending a Non-Access Stratum (NAS) packet containing an Emergency Number List Information Element. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and was published on 2025-01-21.

Any remote attacker with access to send NAS packets can exploit this vulnerability using an unauthenticated cellphone, requiring no privileges, user interaction, or special conditions due to its low attack complexity and network accessibility. Successful exploitation crashes the MME, resulting in a denial-of-service condition that disrupts mobile network management functions without impacting confidentiality or integrity.

The vulnerability is fixed in Magma v1.9 at commit 08472ba98b8321f802e95f5622fa90fec2dea486. Additional details on mitigation are available in the advisory at https://cellularsecurity.org/ransacked.

Details

CWE(s)

Affected Products

linuxfoundation
magma
≤ 1.9

CVEs Like This One

CVE-2023-37029Same product: Linuxfoundation Magma
CVE-2024-24420Same product: Linuxfoundation Magma
CVE-2024-24417Same product: Linuxfoundation Magma
CVE-2024-24421Same product: Linuxfoundation Magma
CVE-2024-24422Same product: Linuxfoundation Magma
CVE-2024-24418Same product: Linuxfoundation Magma
CVE-2023-37032Same product: Linuxfoundation Magma
CVE-2024-24416Same product: Linuxfoundation Magma
CVE-2024-24423Same product: Linuxfoundation Magma
CVE-2024-24419Same product: Linuxfoundation Magma

References