CVE-2024-24428
Published: 21 January 2025
Summary
CVE-2024-24428 is a high-severity Reachable Assertion (CWE-617) vulnerability in Open5Gs Open5Gs. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 41.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-11 (Error Handling).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly addresses the reachable assertion in Open5GS by applying patches to versions beyond 2.6.4, eliminating the vulnerability.
Denial-of-service protection implements mechanisms to block or mitigate crafted NGAP packets that trigger service crashes in Open5GS.
Effective error handling in the oai_nas_5gmm_decode function prevents assertions from causing DoS on malformed NGAP inputs.
NVD Description
A reachable assertion in the oai_nas_5gmm_decode function of Open5GS <= 2.6.4 allows attackers to cause a Denial of Service (DoS) via a crafted NGAP packet.
Deeper analysisAI
CVE-2024-24428 is a reachable assertion vulnerability in the oai_nas_5gmm_decode function of Open5GS versions up to and including 2.6.4. This flaw enables attackers to trigger a Denial of Service (DoS) condition through a crafted NGAP packet. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-617.
An unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. By sending a specially crafted NGAP packet to an affected Open5GS deployment, the attacker triggers the assertion in the NAS 5GMM decoding process, resulting in a crash or service disruption that impacts availability without affecting confidentiality or integrity.
Mitigation details are available in the advisory published at https://cellularsecurity.org/ransacked, which was referenced alongside the CVE publication on 2025-01-21.
Details
- CWE(s)