CVE-2026-32319: CWE-125: Out-of-bounds Read in ellanetworks core
CVE-2026-32319 is a high-severity out-of-bounds read vulnerability in Ella Core, a 5G core designed for private networks. Versions prior to 1. 5. 1 panic when processing malformed NGAP/NAS messages shorter than 7 bytes, allowing unauthenticated attackers to crash the core process. This results in denial of service, disrupting connectivity for all subscribers relying on the affected core. No authentication or user interaction is required, making exploitation relatively straightforward over the network. The vulnerability affects only versions before 1. 5. 1, which has addressed the issue. While no known exploits are currently reported in the wild, the impact on availability is significant for organizations using vulnerable versions.
AI Analysis
Technical Summary
CVE-2026-32319 is an out-of-bounds read vulnerability classified under CWE-125 affecting Ella Core, a 5G core network solution tailored for private network deployments. The flaw exists in versions prior to 1.5.1, where the core software panics when it processes a malformed NGAP (Next Generation Application Protocol) or NAS (Non-Access Stratum) message that is integrity protected but has a length under 7 bytes. This malformed message triggers an out-of-bounds read condition, causing the core process to crash. Since the core is responsible for managing subscriber sessions and connectivity, this crash results in a denial of service affecting all connected subscribers. The vulnerability can be exploited remotely by an attacker capable of sending crafted NAS messages without requiring any authentication or user interaction, increasing the attack surface significantly. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no privileges required, no user interaction, and high impact on availability. The vulnerability does not impact confidentiality or integrity directly but severely impacts service availability. The issue was fixed in version 1.5.1 of Ella Core. No public exploit code or active exploitation has been reported yet, but the ease of exploitation and impact make it a critical patching priority for affected organizations.
Potential Impact
The primary impact of CVE-2026-32319 is a denial of service condition in 5G private networks using vulnerable versions of Ella Core. By crashing the core process, attackers can disrupt all subscriber connectivity managed by the core, leading to service outages. This can affect enterprise environments relying on private 5G for critical operations, including manufacturing, logistics, healthcare, and smart infrastructure. The lack of authentication requirement means attackers can exploit this remotely, potentially from outside the network perimeter if message access is not tightly controlled. The disruption could lead to operational downtime, financial losses, and reputational damage. Additionally, repeated exploitation attempts could cause persistent instability. Although confidentiality and integrity are not directly compromised, the availability impact alone is significant for organizations depending on continuous 5G connectivity.
Mitigation Recommendations
Organizations using Ella Core versions prior to 1.5.1 should immediately upgrade to version 1.5.1 or later to remediate this vulnerability. Until patching is complete, network administrators should implement strict filtering and validation of NGAP/NAS messages at network boundaries to block malformed or suspicious messages, particularly those with lengths under 7 bytes. Deploying anomaly detection systems to monitor for unusual NAS message patterns can help identify exploitation attempts. Network segmentation and limiting exposure of the core network to untrusted sources reduce the attack surface. Additionally, applying rate limiting on NAS message processing can mitigate the impact of repeated malformed message attempts. Regularly auditing and updating 5G core components and maintaining close coordination with the vendor for security advisories is essential. Finally, incident response plans should include procedures for rapid recovery from core process crashes to minimize downtime.
Affected Countries
United States, Germany, South Korea, Japan, China, United Kingdom, France, India, Australia, Canada
CVE-2026-32319: CWE-125: Out-of-bounds Read in ellanetworks core
Description
CVE-2026-32319 is a high-severity out-of-bounds read vulnerability in Ella Core, a 5G core designed for private networks. Versions prior to 1. 5. 1 panic when processing malformed NGAP/NAS messages shorter than 7 bytes, allowing unauthenticated attackers to crash the core process. This results in denial of service, disrupting connectivity for all subscribers relying on the affected core. No authentication or user interaction is required, making exploitation relatively straightforward over the network. The vulnerability affects only versions before 1. 5. 1, which has addressed the issue. While no known exploits are currently reported in the wild, the impact on availability is significant for organizations using vulnerable versions.
AI-Powered Analysis
Technical Analysis
CVE-2026-32319 is an out-of-bounds read vulnerability classified under CWE-125 affecting Ella Core, a 5G core network solution tailored for private network deployments. The flaw exists in versions prior to 1.5.1, where the core software panics when it processes a malformed NGAP (Next Generation Application Protocol) or NAS (Non-Access Stratum) message that is integrity protected but has a length under 7 bytes. This malformed message triggers an out-of-bounds read condition, causing the core process to crash. Since the core is responsible for managing subscriber sessions and connectivity, this crash results in a denial of service affecting all connected subscribers. The vulnerability can be exploited remotely by an attacker capable of sending crafted NAS messages without requiring any authentication or user interaction, increasing the attack surface significantly. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no privileges required, no user interaction, and high impact on availability. The vulnerability does not impact confidentiality or integrity directly but severely impacts service availability. The issue was fixed in version 1.5.1 of Ella Core. No public exploit code or active exploitation has been reported yet, but the ease of exploitation and impact make it a critical patching priority for affected organizations.
Potential Impact
The primary impact of CVE-2026-32319 is a denial of service condition in 5G private networks using vulnerable versions of Ella Core. By crashing the core process, attackers can disrupt all subscriber connectivity managed by the core, leading to service outages. This can affect enterprise environments relying on private 5G for critical operations, including manufacturing, logistics, healthcare, and smart infrastructure. The lack of authentication requirement means attackers can exploit this remotely, potentially from outside the network perimeter if message access is not tightly controlled. The disruption could lead to operational downtime, financial losses, and reputational damage. Additionally, repeated exploitation attempts could cause persistent instability. Although confidentiality and integrity are not directly compromised, the availability impact alone is significant for organizations depending on continuous 5G connectivity.
Mitigation Recommendations
Organizations using Ella Core versions prior to 1.5.1 should immediately upgrade to version 1.5.1 or later to remediate this vulnerability. Until patching is complete, network administrators should implement strict filtering and validation of NGAP/NAS messages at network boundaries to block malformed or suspicious messages, particularly those with lengths under 7 bytes. Deploying anomaly detection systems to monitor for unusual NAS message patterns can help identify exploitation attempts. Network segmentation and limiting exposure of the core network to untrusted sources reduce the attack surface. Additionally, applying rate limiting on NAS message processing can mitigate the impact of repeated malformed message attempts. Regularly auditing and updating 5G core components and maintaining close coordination with the vendor for security advisories is essential. Finally, incident response plans should include procedures for rapid recovery from core process crashes to minimize downtime.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-11T21:16:21.661Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b3375b2f860ef943024587
Added to database: 3/12/2026, 9:59:55 PM
Last enriched: 3/12/2026, 10:14:20 PM
Last updated: 3/13/2026, 12:11:54 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.