CVE-2024-34475: n/a
Open5GS before 2.7.1 is vulnerable to a reachable assertion that can cause an AMF crash via NAS messages from a UE: gmm_state_authentication in amf/gmm-sm.c for != OGS_ERROR.
AI Analysis
Technical Summary
CVE-2024-34475 is a vulnerability identified in Open5GS, an open-source 5G core network implementation, specifically affecting versions prior to 2.7.1. The flaw exists in the Access and Mobility Management Function (AMF) component, within the gmm_state_authentication function of the amf/gmm-sm.c source file. The vulnerability is due to a reachable assertion that triggers when the function encounters a condition where the error code is not equal to OGS_ERROR, causing the assertion to fail and crash the AMF process. This crash results in a denial of service (DoS) by disrupting the AMF's ability to handle NAS (Non-Access Stratum) messages from User Equipment (UE). Since the AMF is critical for managing UE registration, authentication, and mobility in 5G networks, its unavailability can severely impact network operations. The vulnerability can be exploited remotely without authentication or user interaction, as it involves sending crafted NAS messages to the AMF. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the significant impact on availability. No confidentiality or integrity impacts are noted. No patches were linked in the provided data, but upgrading to Open5GS version 2.7.1 or later is implied to remediate the issue. No active exploits have been reported in the wild at the time of publication.
Potential Impact
The primary impact of CVE-2024-34475 is a denial of service condition affecting the AMF component of Open5GS-based 5G core networks. This disruption can prevent the AMF from processing NAS messages, which are essential for user authentication, registration, and mobility management. As a result, affected networks may experience service outages, dropped connections, or inability to authenticate new or roaming users, leading to degraded network availability and user experience. For mobile network operators and service providers relying on Open5GS, this could translate into significant operational disruptions and potential revenue loss. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data manipulation are not direct concerns. However, the availability impact on critical 5G infrastructure could have cascading effects on dependent services, including IoT deployments, emergency communications, and enterprise connectivity. The ease of remote exploitation without authentication increases the risk of widespread attacks if the vulnerability is left unpatched.
Mitigation Recommendations
To mitigate CVE-2024-34475, organizations should immediately upgrade Open5GS to version 2.7.1 or later, where the assertion failure has been addressed. In environments where immediate upgrading is not feasible, network operators should implement strict filtering and validation of NAS messages at the network edge to block malformed or suspicious traffic targeting the AMF. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous NAS message patterns can help identify and mitigate exploitation attempts. Additionally, isolating the AMF component within a segmented and monitored network zone reduces the attack surface. Continuous monitoring of AMF process health and automated restart mechanisms can minimize downtime in case of crashes. Operators should also maintain up-to-date incident response plans tailored to 5G core network components and conduct regular security assessments to detect similar vulnerabilities proactively.
Affected Countries
United States, China, South Korea, Japan, Germany, France, United Kingdom, India, Brazil, Italy, Canada, Australia, Russia, Singapore
CVE-2024-34475: n/a
Description
Open5GS before 2.7.1 is vulnerable to a reachable assertion that can cause an AMF crash via NAS messages from a UE: gmm_state_authentication in amf/gmm-sm.c for != OGS_ERROR.
AI-Powered Analysis
Technical Analysis
CVE-2024-34475 is a vulnerability identified in Open5GS, an open-source 5G core network implementation, specifically affecting versions prior to 2.7.1. The flaw exists in the Access and Mobility Management Function (AMF) component, within the gmm_state_authentication function of the amf/gmm-sm.c source file. The vulnerability is due to a reachable assertion that triggers when the function encounters a condition where the error code is not equal to OGS_ERROR, causing the assertion to fail and crash the AMF process. This crash results in a denial of service (DoS) by disrupting the AMF's ability to handle NAS (Non-Access Stratum) messages from User Equipment (UE). Since the AMF is critical for managing UE registration, authentication, and mobility in 5G networks, its unavailability can severely impact network operations. The vulnerability can be exploited remotely without authentication or user interaction, as it involves sending crafted NAS messages to the AMF. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the significant impact on availability. No confidentiality or integrity impacts are noted. No patches were linked in the provided data, but upgrading to Open5GS version 2.7.1 or later is implied to remediate the issue. No active exploits have been reported in the wild at the time of publication.
Potential Impact
The primary impact of CVE-2024-34475 is a denial of service condition affecting the AMF component of Open5GS-based 5G core networks. This disruption can prevent the AMF from processing NAS messages, which are essential for user authentication, registration, and mobility management. As a result, affected networks may experience service outages, dropped connections, or inability to authenticate new or roaming users, leading to degraded network availability and user experience. For mobile network operators and service providers relying on Open5GS, this could translate into significant operational disruptions and potential revenue loss. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data manipulation are not direct concerns. However, the availability impact on critical 5G infrastructure could have cascading effects on dependent services, including IoT deployments, emergency communications, and enterprise connectivity. The ease of remote exploitation without authentication increases the risk of widespread attacks if the vulnerability is left unpatched.
Mitigation Recommendations
To mitigate CVE-2024-34475, organizations should immediately upgrade Open5GS to version 2.7.1 or later, where the assertion failure has been addressed. In environments where immediate upgrading is not feasible, network operators should implement strict filtering and validation of NAS messages at the network edge to block malformed or suspicious traffic targeting the AMF. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous NAS message patterns can help identify and mitigate exploitation attempts. Additionally, isolating the AMF component within a segmented and monitored network zone reduces the attack surface. Continuous monitoring of AMF process health and automated restart mechanisms can minimize downtime in case of crashes. Operators should also maintain up-to-date incident response plans tailored to 5G core network components and conduct regular security assessments to detect similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c51b7ef31ef0b562861
Added to database: 2/25/2026, 9:40:33 PM
Last enriched: 2/25/2026, 9:41:49 PM
Last updated: 2/26/2026, 7:59:40 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.