Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24446: n/a

0
Medium
VulnerabilityCVE-2024-24446cvecve-2024-24446
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An uninitialized pointer dereference in OpenAirInterface CN5G AMF up to v2.0.0 allows attackers to cause a Denial of Service (DoS) via a crafted InitialContextSetupResponse message sent to the AMF.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:32:08 UTC

Technical Analysis

CVE-2024-24446 identifies a vulnerability in the OpenAirInterface CN5G Access and Mobility Management Function (AMF) component, specifically up to version 2.0.0. The flaw arises from an uninitialized pointer dereference, a type of programming error where a pointer variable is used before it has been assigned a valid memory address. This can cause the AMF process to crash or behave unpredictably when processing a crafted InitialContextSetupResponse message, which is part of the 5G core network signaling protocol. The AMF is a critical network function responsible for managing connection and mobility for 5G user equipment. An attacker can exploit this vulnerability remotely without authentication by sending a maliciously crafted message, causing a denial of service (DoS) by crashing or destabilizing the AMF. The vulnerability does not affect confidentiality or integrity but impacts availability, potentially disrupting 5G network services. The CVSS score of 6.5 reflects the medium severity, with attack vector being network-based, low attack complexity, no privileges required, but requiring user interaction in the form of message processing. No known public exploits or patches are currently available, and the vulnerability is tracked under CWE-476 (NULL Pointer Dereference).

Potential Impact

The primary impact of this vulnerability is a denial of service condition on the AMF component of the 5G core network. Since the AMF manages critical functions such as session management and mobility, its disruption can lead to dropped connections, inability to establish new sessions, and degraded network performance. This can affect mobile users' access to voice, data, and other 5G services, potentially causing widespread service outages. For network operators and service providers, this can translate into customer dissatisfaction, financial losses, and reputational damage. The vulnerability's ease of exploitation from the network without authentication increases the risk of automated or targeted attacks. However, the lack of known exploits in the wild and the requirement for a crafted protocol message somewhat limit immediate widespread impact. Still, the vulnerability poses a significant risk to organizations deploying OpenAirInterface CN5G AMF in production environments, especially those relying on open-source 5G core implementations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for updates from the OpenAirInterface project and apply patches as soon as they become available. In the absence of official patches, network operators can implement filtering and validation controls to detect and block malformed InitialContextSetupResponse messages at the network perimeter or within internal 5G core network segments. Deploying anomaly detection systems that monitor AMF behavior and alert on crashes or restarts can help identify exploitation attempts early. Network segmentation and strict access controls should be enforced to limit exposure of the AMF to untrusted networks. Additionally, operators should consider redundancy and failover mechanisms for the AMF to maintain service availability in case of crashes. Regular security audits and code reviews of custom or open-source 5G core components can help identify similar vulnerabilities proactively. Finally, collaboration with the OpenAirInterface community for timely vulnerability disclosure and remediation is recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d5cb7ef31ef0b570acc

Added to database: 2/25/2026, 9:45:00 PM

Last enriched: 2/28/2026, 9:32:08 AM

Last updated: 4/12/2026, 12:44:07 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses