Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32319: CWE-125: Out-of-bounds Read in ellanetworks core

0
High
VulnerabilityCVE-2026-32319cvecve-2026-32319cwe-125
Published: Thu Mar 12 2026 (03/12/2026, 21:33:32 UTC)
Source: CVE Database V5
Vendor/Project: ellanetworks
Product: core

Description

CVE-2026-32319 is a high-severity out-of-bounds read vulnerability in Ella Core, a 5G core designed for private networks. Versions prior to 1. 5. 1 panic when processing malformed NGAP/NAS messages shorter than 7 bytes, allowing unauthenticated attackers to crash the core process. This results in denial of service, disrupting connectivity for all subscribers relying on the affected core. No authentication or user interaction is required, making exploitation relatively straightforward over the network. The vulnerability affects only versions before 1. 5. 1, which has addressed the issue. While no known exploits are currently reported in the wild, the impact on availability is significant for organizations using vulnerable versions.

AI-Powered Analysis

AILast updated: 03/12/2026, 22:14:20 UTC

Technical Analysis

CVE-2026-32319 is an out-of-bounds read vulnerability classified under CWE-125 affecting Ella Core, a 5G core network solution tailored for private network deployments. The flaw exists in versions prior to 1.5.1, where the core software panics when it processes a malformed NGAP (Next Generation Application Protocol) or NAS (Non-Access Stratum) message that is integrity protected but has a length under 7 bytes. This malformed message triggers an out-of-bounds read condition, causing the core process to crash. Since the core is responsible for managing subscriber sessions and connectivity, this crash results in a denial of service affecting all connected subscribers. The vulnerability can be exploited remotely by an attacker capable of sending crafted NAS messages without requiring any authentication or user interaction, increasing the attack surface significantly. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no privileges required, no user interaction, and high impact on availability. The vulnerability does not impact confidentiality or integrity directly but severely impacts service availability. The issue was fixed in version 1.5.1 of Ella Core. No public exploit code or active exploitation has been reported yet, but the ease of exploitation and impact make it a critical patching priority for affected organizations.

Potential Impact

The primary impact of CVE-2026-32319 is a denial of service condition in 5G private networks using vulnerable versions of Ella Core. By crashing the core process, attackers can disrupt all subscriber connectivity managed by the core, leading to service outages. This can affect enterprise environments relying on private 5G for critical operations, including manufacturing, logistics, healthcare, and smart infrastructure. The lack of authentication requirement means attackers can exploit this remotely, potentially from outside the network perimeter if message access is not tightly controlled. The disruption could lead to operational downtime, financial losses, and reputational damage. Additionally, repeated exploitation attempts could cause persistent instability. Although confidentiality and integrity are not directly compromised, the availability impact alone is significant for organizations depending on continuous 5G connectivity.

Mitigation Recommendations

Organizations using Ella Core versions prior to 1.5.1 should immediately upgrade to version 1.5.1 or later to remediate this vulnerability. Until patching is complete, network administrators should implement strict filtering and validation of NGAP/NAS messages at network boundaries to block malformed or suspicious messages, particularly those with lengths under 7 bytes. Deploying anomaly detection systems to monitor for unusual NAS message patterns can help identify exploitation attempts. Network segmentation and limiting exposure of the core network to untrusted sources reduce the attack surface. Additionally, applying rate limiting on NAS message processing can mitigate the impact of repeated malformed message attempts. Regularly auditing and updating 5G core components and maintaining close coordination with the vendor for security advisories is essential. Finally, incident response plans should include procedures for rapid recovery from core process crashes to minimize downtime.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3375b2f860ef943024587

Added to database: 3/12/2026, 9:59:55 PM

Last enriched: 3/12/2026, 10:14:20 PM

Last updated: 3/13/2026, 12:11:54 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses