CVE-2024-24450: n/a
Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE.
AI Analysis
Technical Summary
CVE-2024-24450 is a stack-based buffer overflow vulnerability identified in the OpenAirInterface CN5G Access and Mobility Management Function (AMF) software, versions up to and including 2.0.0. The flaw exists in the ngap_handle_pdu_session_resource_setup_response routine, which processes PDU Session Resource Setup Response messages received over the N2 interface. Specifically, the vulnerability arises when the FailedToSetupList Information Element (IE) within the response message is crafted with a size larger than expected, causing a memcpy operation to overflow a stack buffer. This overflow can lead to memory corruption, resulting in denial of service conditions by crashing the AMF or, in some cases, enabling remote code execution. Exploitation requires the attacker to have network-level access to the N2 interface, which connects the AMF to the RAN (Radio Access Network). The attack complexity is high due to the need to craft precise malformed messages, but no user interaction is required. The vulnerability is classified under CWE-120 (Classic Buffer Overflow). The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the availability impact and the requirement for some privileges and high attack complexity. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to 5G core network infrastructure relying on OpenAirInterface CN5G AMF.
Potential Impact
The primary impact of CVE-2024-24450 is on the availability of the 5G core network's AMF component, which is critical for managing mobility and session states in 5G networks. Successful exploitation can cause denial of service, disrupting network connectivity and session management for subscribers, potentially leading to widespread service outages. In worst-case scenarios, remote code execution could allow attackers to take control of the AMF, enabling further attacks such as interception, manipulation of subscriber data, or lateral movement within the telecom network. This could undermine the integrity and confidentiality of the 5G network. Given the central role of the AMF in 5G architecture, such disruptions could affect telecom operators, service providers, and their customers, impacting critical communications and services. The requirement for access to the N2 interface limits the attack surface to entities with network-level access, but insider threats or compromised network segments could exploit this vulnerability. The medium CVSS score reflects the balance between impact and exploitation complexity, but the strategic importance of 5G infrastructure elevates the overall risk.
Mitigation Recommendations
Organizations should implement strict network segmentation and access controls to limit access to the N2 interface only to trusted and authenticated network elements. Deploying network monitoring and anomaly detection systems to identify unusual or malformed NGAP messages can help detect exploitation attempts early. Since no official patches are currently available, operators should consider applying temporary mitigations such as filtering or rate-limiting suspicious PDU Session Resource Setup Response messages at the network edge. Updating to newer versions of OpenAirInterface CN5G AMF once patches are released is critical. Additionally, conducting regular security assessments and penetration testing focused on the 5G core network components can help identify and remediate similar vulnerabilities proactively. Employing defense-in-depth strategies, including intrusion prevention systems (IPS) tailored for telecom protocols, will further reduce risk. Maintaining close coordination with vendors and security communities for timely vulnerability disclosures and patches is essential.
Affected Countries
United States, China, South Korea, Japan, Germany, France, United Kingdom, India, Brazil, Italy
CVE-2024-24450: n/a
Description
Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-24450 is a stack-based buffer overflow vulnerability identified in the OpenAirInterface CN5G Access and Mobility Management Function (AMF) software, versions up to and including 2.0.0. The flaw exists in the ngap_handle_pdu_session_resource_setup_response routine, which processes PDU Session Resource Setup Response messages received over the N2 interface. Specifically, the vulnerability arises when the FailedToSetupList Information Element (IE) within the response message is crafted with a size larger than expected, causing a memcpy operation to overflow a stack buffer. This overflow can lead to memory corruption, resulting in denial of service conditions by crashing the AMF or, in some cases, enabling remote code execution. Exploitation requires the attacker to have network-level access to the N2 interface, which connects the AMF to the RAN (Radio Access Network). The attack complexity is high due to the need to craft precise malformed messages, but no user interaction is required. The vulnerability is classified under CWE-120 (Classic Buffer Overflow). The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the availability impact and the requirement for some privileges and high attack complexity. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to 5G core network infrastructure relying on OpenAirInterface CN5G AMF.
Potential Impact
The primary impact of CVE-2024-24450 is on the availability of the 5G core network's AMF component, which is critical for managing mobility and session states in 5G networks. Successful exploitation can cause denial of service, disrupting network connectivity and session management for subscribers, potentially leading to widespread service outages. In worst-case scenarios, remote code execution could allow attackers to take control of the AMF, enabling further attacks such as interception, manipulation of subscriber data, or lateral movement within the telecom network. This could undermine the integrity and confidentiality of the 5G network. Given the central role of the AMF in 5G architecture, such disruptions could affect telecom operators, service providers, and their customers, impacting critical communications and services. The requirement for access to the N2 interface limits the attack surface to entities with network-level access, but insider threats or compromised network segments could exploit this vulnerability. The medium CVSS score reflects the balance between impact and exploitation complexity, but the strategic importance of 5G infrastructure elevates the overall risk.
Mitigation Recommendations
Organizations should implement strict network segmentation and access controls to limit access to the N2 interface only to trusted and authenticated network elements. Deploying network monitoring and anomaly detection systems to identify unusual or malformed NGAP messages can help detect exploitation attempts early. Since no official patches are currently available, operators should consider applying temporary mitigations such as filtering or rate-limiting suspicious PDU Session Resource Setup Response messages at the network edge. Updating to newer versions of OpenAirInterface CN5G AMF once patches are released is critical. Additionally, conducting regular security assessments and penetration testing focused on the 5G core network components can help identify and remediate similar vulnerabilities proactively. Employing defense-in-depth strategies, including intrusion prevention systems (IPS) tailored for telecom protocols, will further reduce risk. Maintaining close coordination with vendors and security communities for timely vulnerability disclosures and patches is essential.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-25T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d5cb7ef31ef0b570ad8
Added to database: 2/25/2026, 9:45:00 PM
Last enriched: 2/28/2026, 9:32:49 AM
Last updated: 4/12/2026, 3:45:01 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.