CVE-2024-24427
Published: 21 January 2025
Summary
CVE-2024-24427 is a high-severity Reachable Assertion (CWE-617) vulnerability in Open5Gs Open5Gs. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 41.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Remediating the reachable assertion flaw in the amf_ue_set_suci function of Open5GS directly prevents attackers from triggering DoS crashes via crafted NAS packets.
Validating incoming NAS packets rejects malformed inputs before they reach the vulnerable amf_ue_set_suci function, preventing the assertion failure.
Robust error handling in the AMF component ensures assertion failures do not crash the process, maintaining availability against crafted NAS packets.
NVD Description
A reachable assertion in the amf_ue_set_suci function of Open5GS <= 2.6.4 allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet.
Deeper analysisAI
CVE-2024-24427 is a reachable assertion vulnerability in the `amf_ue_set_suci` function within Open5GS versions up to and including 2.6.4. This flaw affects the Access and Mobility Management Function (AMF) component of the open-source 5G core network stack, enabling attackers to trigger a denial-of-service (DoS) condition through a specially crafted Non-Access Stratum (NAS) packet. The vulnerability is rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-617 (Reachable Assertion).
Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By sending a malicious NAS packet to an affected Open5GS deployment, an attacker can cause the assertion to fail, leading to a crash of the AMF process and disrupting 5G core network services, resulting in a high-impact availability denial.
Mitigation details and further advisories are available at https://cellularsecurity.org/ransacked, published in relation to this vulnerability.
Details
- CWE(s)