Cyber Posture

CVE-2024-24420

HighPublic PoC

Published: 21 January 2025

Published
21 January 2025
Modified
03 July 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0011 28.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-24420 is a high-severity Reachable Assertion (CWE-617) vulnerability in Linuxfoundation Magma. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 28.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires organizations to identify, report, and correct flaws like the reachable assertion in Magma's decode_linked_ti_ie function by applying the fix in v1.9.

prevent

SI-10 enforces validation of untrusted inputs such as crafted NAS packets to block those triggering the assertion failure.

prevent

SI-11 mandates error handling that does not compromise availability, preventing crashes from assertion failures on malformed linked TI IEs.

NVD Description

A reachable assertion in the decode_linked_ti_ie function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet.

Deeper analysisAI

CVE-2024-24420 is a reachable assertion vulnerability in the decode_linked_ti_ie function within Magma versions up to and including 1.8.0. Magma is an open-source software platform affected by this issue, which was published on 2025-01-21. The flaw, tied to CWE-617, enables attackers to trigger a Denial of Service (DoS) condition through a crafted NAS packet. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

The vulnerability can be exploited by any unauthenticated attacker with network access to the affected Magma instance, requiring low attack complexity and no user interaction. By sending a specially crafted NAS packet to the vulnerable decode_linked_ti_ie function, the attacker triggers a reachable assertion, causing the service to crash and disrupting availability without impacting confidentiality or integrity.

Mitigation is available in Magma v1.9 through commit 08472ba98b8321f802e95f5622fa90fec2dea486, which addresses the assertion failure. Security practitioners should upgrade to this fixed version. Additional details are provided in the advisory at https://cellularsecurity.org/ransacked.

Details

CWE(s)

Affected Products

linuxfoundation
magma
≤ 1.8.0

CVEs Like This One

CVE-2023-37029Same product: Linuxfoundation Magma
CVE-2023-37024Same product: Linuxfoundation Magma
CVE-2024-24417Same product: Linuxfoundation Magma
CVE-2024-24421Same product: Linuxfoundation Magma
CVE-2024-24422Same product: Linuxfoundation Magma
CVE-2024-24418Same product: Linuxfoundation Magma
CVE-2024-24416Same product: Linuxfoundation Magma
CVE-2024-24423Same product: Linuxfoundation Magma
CVE-2024-24419Same product: Linuxfoundation Magma
CVE-2023-37032Same product: Linuxfoundation Magma

References