CVE-2024-51179: n/a
CVE-2024-51179 is a high-severity vulnerability in Open 5GS version 2. 7. 1 that allows remote attackers to cause a denial of service (DoS) by exploiting the Network Function Virtualizations (NFVs), specifically targeting the User Plane Function (UPF) and Session Management Function (SMF) during the Packet Data Unit (PDU) session establishment process. The vulnerability requires no authentication or user interaction and can be exploited over the network, leading to service disruption without compromising confidentiality or integrity. No known exploits are currently reported in the wild. Organizations relying on Open 5GS for 5G core network functions should prioritize patching or applying mitigations once available to prevent potential DoS attacks that could impact network availability and service continuity.
AI Analysis
Technical Summary
CVE-2024-51179 is a vulnerability identified in Open 5GS version 2.7.1, an open-source implementation of the 5G core network. The flaw resides in the handling of the Packet Data Unit (PDU) session establishment process within the Network Function Virtualizations (NFVs), particularly affecting the User Plane Function (UPF) and Session Management Function (SMF). These components are critical for managing data sessions and routing user traffic in 5G networks. The vulnerability allows a remote attacker to send crafted network traffic that triggers a denial of service condition, causing the affected NFVs to crash or become unresponsive. This results in disruption of the PDU session establishment, effectively denying service to legitimate users. The vulnerability is exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and significant impact on availability. The underlying weakness is classified under CWE-404 (Improper Resource Shutdown or Release), indicating that the affected components fail to properly handle resource cleanup during session establishment, leading to instability or crashes. No patches or fixes have been linked yet, and no active exploits have been reported, but the exposure of critical 5G core functions makes this a significant threat to network operators using Open 5GS.
Potential Impact
The primary impact of CVE-2024-51179 is a denial of service condition affecting 5G core network functions, specifically the UPF and SMF, which are essential for managing user data sessions. Successful exploitation can disrupt the establishment of PDU sessions, leading to service outages or degraded network performance. This can affect mobile network operators, service providers, and enterprises relying on Open 5GS for their 5G infrastructure. The disruption could result in loss of connectivity for end users, impacting voice, data, and IoT services. Given the critical role of 5G networks in modern communications, such outages could have cascading effects on emergency services, industrial automation, and other latency-sensitive applications. While confidentiality and integrity are not directly impacted, the availability degradation poses a significant operational risk. The lack of authentication requirements and remote exploitability increase the likelihood of attacks, potentially by opportunistic attackers or nation-state actors targeting telecommunications infrastructure.
Mitigation Recommendations
Organizations using Open 5GS version 2.7.1 should immediately assess their exposure to this vulnerability. Since no official patches are currently available, operators should implement network-level protections such as filtering and rate-limiting traffic directed at the UPF and SMF interfaces to mitigate potential exploitation. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous PDU session establishment requests can help identify and block attack attempts. Network segmentation and isolation of NFV components can limit the blast radius of an attack. Monitoring system logs and performance metrics for signs of instability or crashes in UPF and SMF functions is critical for early detection. Operators should stay informed on updates from the Open 5GS project and apply patches promptly once released. Additionally, conducting regular security audits and penetration testing focused on 5G core network components will improve overall resilience against similar vulnerabilities.
Affected Countries
United States, Germany, South Korea, Japan, China, India, United Kingdom, France, Italy, Canada, Australia, Brazil, Russia, United Arab Emirates
CVE-2024-51179: n/a
Description
CVE-2024-51179 is a high-severity vulnerability in Open 5GS version 2. 7. 1 that allows remote attackers to cause a denial of service (DoS) by exploiting the Network Function Virtualizations (NFVs), specifically targeting the User Plane Function (UPF) and Session Management Function (SMF) during the Packet Data Unit (PDU) session establishment process. The vulnerability requires no authentication or user interaction and can be exploited over the network, leading to service disruption without compromising confidentiality or integrity. No known exploits are currently reported in the wild. Organizations relying on Open 5GS for 5G core network functions should prioritize patching or applying mitigations once available to prevent potential DoS attacks that could impact network availability and service continuity.
AI-Powered Analysis
Technical Analysis
CVE-2024-51179 is a vulnerability identified in Open 5GS version 2.7.1, an open-source implementation of the 5G core network. The flaw resides in the handling of the Packet Data Unit (PDU) session establishment process within the Network Function Virtualizations (NFVs), particularly affecting the User Plane Function (UPF) and Session Management Function (SMF). These components are critical for managing data sessions and routing user traffic in 5G networks. The vulnerability allows a remote attacker to send crafted network traffic that triggers a denial of service condition, causing the affected NFVs to crash or become unresponsive. This results in disruption of the PDU session establishment, effectively denying service to legitimate users. The vulnerability is exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and significant impact on availability. The underlying weakness is classified under CWE-404 (Improper Resource Shutdown or Release), indicating that the affected components fail to properly handle resource cleanup during session establishment, leading to instability or crashes. No patches or fixes have been linked yet, and no active exploits have been reported, but the exposure of critical 5G core functions makes this a significant threat to network operators using Open 5GS.
Potential Impact
The primary impact of CVE-2024-51179 is a denial of service condition affecting 5G core network functions, specifically the UPF and SMF, which are essential for managing user data sessions. Successful exploitation can disrupt the establishment of PDU sessions, leading to service outages or degraded network performance. This can affect mobile network operators, service providers, and enterprises relying on Open 5GS for their 5G infrastructure. The disruption could result in loss of connectivity for end users, impacting voice, data, and IoT services. Given the critical role of 5G networks in modern communications, such outages could have cascading effects on emergency services, industrial automation, and other latency-sensitive applications. While confidentiality and integrity are not directly impacted, the availability degradation poses a significant operational risk. The lack of authentication requirements and remote exploitability increase the likelihood of attacks, potentially by opportunistic attackers or nation-state actors targeting telecommunications infrastructure.
Mitigation Recommendations
Organizations using Open 5GS version 2.7.1 should immediately assess their exposure to this vulnerability. Since no official patches are currently available, operators should implement network-level protections such as filtering and rate-limiting traffic directed at the UPF and SMF interfaces to mitigate potential exploitation. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous PDU session establishment requests can help identify and block attack attempts. Network segmentation and isolation of NFV components can limit the blast radius of an attack. Monitoring system logs and performance metrics for signs of instability or crashes in UPF and SMF functions is critical for early detection. Operators should stay informed on updates from the Open 5GS project and apply patches promptly once released. Additionally, conducting regular security audits and penetration testing focused on 5G core network components will improve overall resilience against similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bacb7ef31ef0b55888e
Added to database: 2/25/2026, 9:37:48 PM
Last enriched: 2/26/2026, 1:24:13 AM
Last updated: 2/26/2026, 11:52:34 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.