CVE-2022-38871: n/a in n/a
In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.
AI Analysis
Technical Summary
CVE-2022-38871 is a high-severity vulnerability identified in Free5gc version 3.0.5, an open-source 5G core network implementation. The vulnerability arises from the Access and Mobility Management Function (AMF) component, which is responsible for handling NAS (Non-Access Stratum) signaling messages between the user equipment (UE) and the 5G core network. Specifically, the AMF breaks or crashes when it processes malformed NAS messages. This indicates a denial-of-service (DoS) condition triggered by sending crafted NAS messages that the AMF cannot properly handle. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, suggesting that the malformed messages cause excessive resource usage or unhandled exceptions leading to service disruption. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but a high impact on availability (A:H). No known exploits in the wild have been reported, and no patches or vendor advisories are currently linked. The lack of vendor or product information beyond Free5gc v3.0.5 limits detailed attribution, but the vulnerability clearly affects 5G core network deployments using this software version. Attackers can remotely cause denial of service by sending malformed NAS messages, potentially disrupting mobile network availability and service continuity.
Potential Impact
For European organizations, especially mobile network operators (MNOs), telecom infrastructure providers, and enterprises deploying private 5G networks using Free5gc v3.0.5, this vulnerability poses a significant risk. Exploitation can lead to denial of service of the AMF, a critical 5G core function responsible for mobility management and session handling. This disruption can cause dropped connections, failed registrations, and degraded network performance, impacting end-users and business-critical applications relying on 5G connectivity. Given the increasing adoption of 5G in Europe for industrial automation, smart cities, and IoT, such a DoS could have cascading effects on operational technology and public services. Although no confidentiality or integrity impact is noted, availability loss in telecom infrastructure can have severe economic and reputational consequences. The vulnerability's network-level exploitability without authentication or user interaction increases the attack surface, making it a practical threat if Free5gc v3.0.5 is in active use. However, the open-source nature of Free5gc means that commercial operators may use customized or patched versions, potentially mitigating exposure. Still, smaller operators or research/test deployments may be more vulnerable.
Mitigation Recommendations
1. Immediate mitigation involves upgrading Free5gc to a version where this vulnerability is patched. If no official patch exists, operators should monitor Free5gc repositories and community advisories for updates addressing CVE-2022-38871. 2. Implement network-level filtering to detect and block malformed NAS messages or anomalous traffic patterns targeting the AMF. This may involve deep packet inspection or protocol-aware firewalls tailored to 5G NAS signaling. 3. Deploy rate limiting and anomaly detection on the AMF interfaces to prevent resource exhaustion from malformed or excessive NAS messages. 4. Conduct thorough testing of 5G core components under malformed input scenarios to identify and remediate similar robustness issues proactively. 5. For private 5G deployments, restrict access to the AMF interfaces to trusted networks and authenticated entities only, reducing exposure to unauthenticated attacks. 6. Maintain comprehensive monitoring and alerting on AMF health and performance metrics to detect early signs of DoS conditions. 7. Engage with the Free5gc open-source community to contribute patches or share threat intelligence related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2022-38871: n/a in n/a
Description
In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.
AI-Powered Analysis
Technical Analysis
CVE-2022-38871 is a high-severity vulnerability identified in Free5gc version 3.0.5, an open-source 5G core network implementation. The vulnerability arises from the Access and Mobility Management Function (AMF) component, which is responsible for handling NAS (Non-Access Stratum) signaling messages between the user equipment (UE) and the 5G core network. Specifically, the AMF breaks or crashes when it processes malformed NAS messages. This indicates a denial-of-service (DoS) condition triggered by sending crafted NAS messages that the AMF cannot properly handle. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, suggesting that the malformed messages cause excessive resource usage or unhandled exceptions leading to service disruption. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but a high impact on availability (A:H). No known exploits in the wild have been reported, and no patches or vendor advisories are currently linked. The lack of vendor or product information beyond Free5gc v3.0.5 limits detailed attribution, but the vulnerability clearly affects 5G core network deployments using this software version. Attackers can remotely cause denial of service by sending malformed NAS messages, potentially disrupting mobile network availability and service continuity.
Potential Impact
For European organizations, especially mobile network operators (MNOs), telecom infrastructure providers, and enterprises deploying private 5G networks using Free5gc v3.0.5, this vulnerability poses a significant risk. Exploitation can lead to denial of service of the AMF, a critical 5G core function responsible for mobility management and session handling. This disruption can cause dropped connections, failed registrations, and degraded network performance, impacting end-users and business-critical applications relying on 5G connectivity. Given the increasing adoption of 5G in Europe for industrial automation, smart cities, and IoT, such a DoS could have cascading effects on operational technology and public services. Although no confidentiality or integrity impact is noted, availability loss in telecom infrastructure can have severe economic and reputational consequences. The vulnerability's network-level exploitability without authentication or user interaction increases the attack surface, making it a practical threat if Free5gc v3.0.5 is in active use. However, the open-source nature of Free5gc means that commercial operators may use customized or patched versions, potentially mitigating exposure. Still, smaller operators or research/test deployments may be more vulnerable.
Mitigation Recommendations
1. Immediate mitigation involves upgrading Free5gc to a version where this vulnerability is patched. If no official patch exists, operators should monitor Free5gc repositories and community advisories for updates addressing CVE-2022-38871. 2. Implement network-level filtering to detect and block malformed NAS messages or anomalous traffic patterns targeting the AMF. This may involve deep packet inspection or protocol-aware firewalls tailored to 5G NAS signaling. 3. Deploy rate limiting and anomaly detection on the AMF interfaces to prevent resource exhaustion from malformed or excessive NAS messages. 4. Conduct thorough testing of 5G core components under malformed input scenarios to identify and remediate similar robustness issues proactively. 5. For private 5G deployments, restrict access to the AMF interfaces to trusted networks and authenticated entities only, reducing exposure to unauthenticated attacks. 6. Maintain comprehensive monitoring and alerting on AMF health and performance metrics to detect early signs of DoS conditions. 7. Engage with the Free5gc open-source community to contribute patches or share threat intelligence related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-08-29T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee1ed
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 7/2/2025, 4:42:27 AM
Last updated: 7/31/2025, 5:27:29 PM
Views: 11
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.