CVE-2026-30080
Published: 08 April 2026
Summary
CVE-2026-30080 is a high-severity Authentication Bypass by Capture-replay (CWE-294) vulnerability in Openairinterface Oai-Cn5G-Amf. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-13 (Cryptographic Protection) and SC-23 (Session Authenticity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific flaw in OpenAirInterface AMF that accepts IA0 security capability and downgrades to no integrity protection, preventing replay attacks.
Mandates cryptographic mechanisms including integrity protection for communications, ensuring Security Mode Complete messages are not accepted without integrity and blocking replay exploitation.
Requires replay-resistant session authentication, directly countering replay attacks enabled by the downgraded security context lacking integrity protection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in publicly accessible AMF enables remote unauthenticated exploitation (T1190); lack of integrity protection directly facilitates MitM-style replay of signaling (T1557) and manipulation of transmitted messages (T1565.002).
NVD Description
OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead…
more
to the possibility of replay attack.
Deeper analysisAI
CVE-2026-30080 is a vulnerability in OpenAirInterface version 2.2.0, specifically within the CN5G AMF (Access and Mobility Management Function) component. The issue arises because the software accepts a Security Mode Complete message without any integrity protection, even though its configuration supports integrity algorithms NIA1 and NIA2. If a UE (User Equipment) sends an initial registration request advertising only the IA0 security capability (indicating no integrity), OpenAirInterface accepts it and proceeds, establishing a downgraded security context. This flaw is classified under CWE-294 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
An unauthenticated remote attacker can exploit this vulnerability by impersonating a UE and transmitting an initial registration request limited to IA0 integrity capability. With network accessibility, low attack complexity, and no required privileges or user interaction, the attacker tricks the AMF into activating a security context devoid of integrity protection. This enables replay attacks, where malicious messages can be captured and resent, resulting in high integrity impacts such as unauthorized modifications or repetitions of critical signaling messages.
The vulnerability is tracked in a GitLab issue for the oai-cn5g-amf repository at https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-amf/-/issues/78, where security practitioners can review details on potential mitigations, patches, or workarounds.
Details
- CWE(s)