Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53828: CWE-228 in Ericsson Packet Core Controller (PCC)

0
Medium
VulnerabilityCVE-2024-53828cvecve-2024-53828cwe-228
Published: Wed Apr 01 2026 (04/01/2026, 09:49:18 UTC)
Source: CVE Database V5
Vendor/Project: Ericsson
Product: Packet Core Controller (PCC)

Description

CVE-2024-53828 is a medium severity vulnerability in Ericsson Packet Core Controller (PCC) versions prior to 1. 38. It involves CWE-228, where an attacker can send a large volume of specially crafted messages to cause service degradation. The vulnerability does not impact confidentiality or integrity but affects availability by potentially disrupting PCC operations. Exploitation requires network access with high attack complexity and no privileges or user interaction. No known exploits are currently reported in the wild. The vulnerability primarily threatens telecom operators using affected Ericsson PCC versions, potentially impacting mobile network service quality. Mitigation involves upgrading to version 1. 38 or later once available and implementing network-level rate limiting and anomaly detection to reduce attack surface. Countries with significant Ericsson PCC deployments and critical telecom infrastructure are at higher risk, including the United States, Sweden, Germany, Japan, South Korea, and others.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 10:23:32 UTC

Technical Analysis

CVE-2024-53828 is a vulnerability classified under CWE-228 affecting Ericsson Packet Core Controller (PCC) versions prior to 1.38. The flaw arises from the PCC's handling of incoming messages, where an attacker can send a large volume of specially crafted messages to the system. This can lead to service degradation, impacting the availability of the PCC. The Packet Core Controller is a critical component in mobile telecommunications networks, responsible for managing data traffic and policy control within the core network. The vulnerability does not compromise confidentiality or integrity but can disrupt service availability, potentially causing denial of service conditions. The CVSS v3.1 base score is 5.3, reflecting medium severity with an attack vector of adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H). Exploitation requires the attacker to be on an adjacent network segment, making remote exploitation over the internet less likely without network access. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of robust input validation and rate limiting in telecom core components to prevent resource exhaustion and service degradation.

Potential Impact

The primary impact of CVE-2024-53828 is on the availability of Ericsson Packet Core Controller services. Since PCC is integral to managing mobile data traffic and policy enforcement, service degradation can lead to partial or full denial of service for mobile network users. This can disrupt voice, data, and signaling services, affecting end-user experience and potentially causing outages in mobile networks. For telecom operators, this may result in customer dissatisfaction, financial losses, and reputational damage. Additionally, degraded PCC performance can affect downstream network elements and services relying on policy control, amplifying the impact. Although the vulnerability does not affect confidentiality or integrity, the availability impact on critical telecom infrastructure is significant, especially in regions heavily reliant on Ericsson equipment. The attack complexity and requirement for adjacent network access limit the threat to insiders or attackers with network proximity, but the risk remains substantial in shared or poorly segmented network environments.

Mitigation Recommendations

1. Upgrade Ericsson Packet Core Controller to version 1.38 or later once the patch is released by Ericsson to address CVE-2024-53828. 2. Implement strict network segmentation and access controls to restrict access to the PCC management and control interfaces, limiting exposure to adjacent network attackers. 3. Deploy rate limiting and traffic anomaly detection mechanisms on network segments hosting PCC to identify and block unusually high volumes of crafted messages indicative of an attack. 4. Monitor PCC logs and network traffic for signs of message flooding or service degradation to enable early detection and response. 5. Conduct regular security assessments and penetration testing focused on telecom core components to identify and remediate similar vulnerabilities proactively. 6. Collaborate with Ericsson support and security advisories to stay informed about updates and recommended best practices for PCC security. 7. Consider deploying additional redundancy and failover mechanisms in the core network to mitigate potential service disruptions caused by such attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ERIC
Date Reserved
2024-11-22T14:21:37.002Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ccee90e6bfc5ba1dbeb77c

Added to database: 4/1/2026, 10:08:16 AM

Last enriched: 4/1/2026, 10:23:32 AM

Last updated: 4/1/2026, 11:19:07 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses