Skip to main content

CVE-2022-43223: n/a in n/a

High
VulnerabilityCVE-2022-43223cvecve-2022-43223
Published: Tue Nov 01 2022 (11/01/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

open5gs v2.4.11 was discovered to contain a memory leak in the component ngap-handler.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted UE attachment.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:40:49 UTC

Technical Analysis

CVE-2022-43223 is a high-severity vulnerability identified in open5gs version 2.4.11, specifically within the ngap-handler.c component. Open5gs is an open-source implementation of 5G core network functions, widely used for research, development, and deployment of 5G networks. The vulnerability is a memory leak (CWE-401) triggered by processing a crafted User Equipment (UE) attachment request. This memory leak can be exploited remotely without authentication or user interaction, leading to resource exhaustion on the affected system. Over time, the leak can cause the open5gs process or the underlying system to become unstable or crash, resulting in a Denial of Service (DoS) condition. The CVSS v3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but a high impact on availability (A:H). There are no known public exploits in the wild at the time of publication, and no official patches have been linked, indicating that mitigation may require manual code review or updates from the open5gs project. The vulnerability affects the core network's ability to handle UE attachment procedures, a fundamental step in 5G connectivity, making it critical for network stability and service availability.

Potential Impact

For European organizations, especially telecom operators, mobile network infrastructure providers, and enterprises deploying private 5G networks, this vulnerability poses a significant risk. Exploitation can lead to service disruptions by causing DoS conditions in 5G core network components, impacting end-user connectivity and critical services relying on 5G. This can affect sectors such as telecommunications, manufacturing, transportation, and public safety, where 5G is increasingly integrated. The denial of service could degrade network reliability and availability, potentially causing cascading effects on dependent applications and services. Given the remote exploitability without authentication, attackers could launch attacks from outside the network, increasing the threat surface. The absence of confidentiality and integrity impact limits data breach risks, but availability degradation in critical infrastructure is a major concern under European cybersecurity regulations and service continuity requirements.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediate assessment of open5gs deployments to identify affected versions, particularly version 2.4.11. 2) Engage with the open5gs community or maintainers to obtain patches or updates addressing this memory leak. If no official patch is available, consider applying temporary mitigations such as limiting UE attachment request rates via network-level filtering or firewall rules to reduce exposure to crafted requests. 3) Implement robust monitoring and alerting on open5gs processes for unusual memory consumption or crashes to detect exploitation attempts early. 4) Deploy network segmentation and access controls to restrict exposure of the 5G core network components to untrusted networks. 5) Conduct penetration testing and vulnerability scanning focused on 5G core components to identify potential exploitation paths. 6) Maintain incident response readiness to quickly isolate and remediate affected systems in case of DoS events. 7) Document and communicate the risk to stakeholders, ensuring compliance with European cybersecurity directives such as NIS2, which emphasize availability and resilience of critical infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb80b

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 7/3/2025, 6:40:49 AM

Last updated: 8/15/2025, 10:43:53 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats