Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40129: n/a

0
High
VulnerabilityCVE-2024-40129cvecve-2024-40129
Published: Tue Jul 16 2024 (07/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Open5GS v2.6.4 is vulnerable to Buffer Overflow. via /lib/pfcp/context.c.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:13:59 UTC

Technical Analysis

CVE-2024-40129 is a buffer overflow vulnerability identified in Open5GS version 2.6.4, an open-source implementation of the 5G core network. The flaw exists in the /lib/pfcp/context.c source file, which handles PFCP (Packet Forwarding Control Protocol) contexts—a critical protocol in 5G core networks responsible for managing user plane functions and session management. The vulnerability arises from improper bounds checking or unsafe memory operations that allow an attacker to overwrite memory buffers. Exploitation requires no privileges or user interaction and can be performed remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to denial of service (crashing the network function) or potentially arbitrary code execution, threatening the confidentiality, integrity, and availability of the 5G core network. The CVSS score of 8.6 reflects a high severity, primarily due to the impact on availability (A:H) and moderate impact on confidentiality (C:L) and integrity (I:L). No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The CWE-122 classification confirms this is a classic heap-based buffer overflow issue, which is a common and dangerous memory corruption vulnerability type. Given Open5GS's role in 5G infrastructure, this vulnerability could be leveraged to disrupt telecommunications services or facilitate further attacks within the network.

Potential Impact

The impact of CVE-2024-40129 is significant for organizations operating 5G core networks using Open5GS, especially telecommunications providers and enterprises deploying private 5G networks. Exploitation can cause denial of service, resulting in network outages or degraded service quality, which can affect millions of users and critical communications. Additionally, the potential for arbitrary code execution could allow attackers to gain control over network functions, leading to data breaches, interception of communications, or manipulation of network traffic. This could undermine the confidentiality and integrity of sensitive user data and network operations. The vulnerability's remote exploitability without authentication increases the risk of widespread attacks, including from nation-state actors or cybercriminals targeting critical infrastructure. Disruption of 5G core services can have cascading effects on dependent services such as IoT, emergency response, and industrial control systems. Organizations may face regulatory penalties, reputational damage, and financial losses if the vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-40129, organizations should immediately assess their Open5GS deployments and apply any available patches or updates from the Open5GS project once released. In the absence of official patches, applying temporary mitigations such as disabling or restricting access to PFCP interfaces from untrusted networks can reduce exposure. Network segmentation and strict firewall rules should be enforced to limit access to 5G core network components. Conduct thorough code reviews and implement secure coding practices to prevent buffer overflows, including bounds checking and use of safe memory handling functions. Employ runtime protections such as Address Space Layout Randomization (ASLR), stack canaries, and memory protection mechanisms to reduce exploitation success. Regular vulnerability scanning and penetration testing focused on 5G core components can help identify and remediate similar issues proactively. Monitoring network traffic for anomalous PFCP messages and establishing incident response plans for 5G infrastructure are also recommended. Collaboration with vendors and security communities to share threat intelligence will enhance preparedness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ca6b7ef31ef0b567305

Added to database: 2/25/2026, 9:41:58 PM

Last enriched: 2/28/2026, 5:13:59 AM

Last updated: 4/12/2026, 1:37:51 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses