CVE-2026-32320: CWE-125: Out-of-bounds Read in ellanetworks core
CVE-2026-32320 is an out-of-bounds read vulnerability in Ella Core, a 5G core network product designed for private networks. Versions prior to 1. 5. 1 panic when processing a PathSwitchRequest message containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings. This causes the core process to crash, resulting in a denial of service that disrupts service for all connected subscribers. Exploitation requires no authentication and no user interaction, as an attacker only needs to send crafted NGAP messages. The vulnerability is fixed in version 1. 5. 1. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2026-32320 is a vulnerability classified as CWE-125 (Out-of-bounds Read) affecting Ella Core, a 5G core network product used primarily in private 5G deployments. The flaw exists in versions prior to 1.5.1, where the core improperly handles PathSwitchRequest NGAP messages containing UE Security Capabilities fields with zero-length bitstrings for NR encryption or integrity protection algorithms. When such a malformed message is processed, the core attempts to read beyond the allocated buffer boundaries, triggering a panic and crashing the core process. This results in a denial of service (DoS) condition that disrupts connectivity for all subscribers relying on the affected core. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and no user interaction (UI:N). While privileges are required (PR:L), no authentication is needed, meaning an attacker with network access to the NGAP interface can exploit this vulnerability. The vulnerability does not impact confidentiality or integrity but severely affects availability. No known exploits have been reported in the wild as of the publication date. The issue is resolved in version 1.5.1 of Ella Core, and users are advised to upgrade promptly to mitigate the risk.
Potential Impact
The primary impact of this vulnerability is a denial of service affecting availability. Organizations using vulnerable versions of Ella Core in their private 5G networks may experience unexpected core crashes, leading to service outages for all connected user equipment. This can disrupt critical communications, especially in industrial, enterprise, or specialized private network environments relying on 5G for operational continuity. The lack of confidentiality or integrity impact limits the scope to availability, but the ease of exploitation without authentication and the potential for widespread disruption in a core network component elevates the operational risk. Downtime in private 5G networks can affect manufacturing, logistics, healthcare, and other sectors increasingly dependent on reliable low-latency wireless connectivity. Additionally, the vulnerability could be leveraged as part of a larger attack chain to degrade network reliability or cause cascading failures in dependent systems.
Mitigation Recommendations
Organizations should immediately upgrade Ella Core to version 1.5.1 or later, where the vulnerability is fixed. Until the upgrade is applied, network administrators should restrict access to the NGAP interface to trusted entities only, implementing strict network segmentation and firewall rules to limit exposure to potentially malicious actors. Monitoring NGAP traffic for anomalous or malformed PathSwitchRequest messages can help detect exploitation attempts. Deploying intrusion detection or prevention systems with custom signatures targeting zero-length UE Security Capabilities bitstrings may provide additional protection. Regularly auditing and validating 5G core configurations and applying vendor security advisories promptly will reduce risk. Additionally, organizations should have incident response plans to quickly recover from core crashes and minimize downtime. Given the low complexity of exploitation, proactive patch management is the most effective mitigation.
Affected Countries
United States, Germany, South Korea, Japan, China, United Kingdom, France, India, Australia, Canada
CVE-2026-32320: CWE-125: Out-of-bounds Read in ellanetworks core
Description
CVE-2026-32320 is an out-of-bounds read vulnerability in Ella Core, a 5G core network product designed for private networks. Versions prior to 1. 5. 1 panic when processing a PathSwitchRequest message containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings. This causes the core process to crash, resulting in a denial of service that disrupts service for all connected subscribers. Exploitation requires no authentication and no user interaction, as an attacker only needs to send crafted NGAP messages. The vulnerability is fixed in version 1. 5. 1. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
CVE-2026-32320 is a vulnerability classified as CWE-125 (Out-of-bounds Read) affecting Ella Core, a 5G core network product used primarily in private 5G deployments. The flaw exists in versions prior to 1.5.1, where the core improperly handles PathSwitchRequest NGAP messages containing UE Security Capabilities fields with zero-length bitstrings for NR encryption or integrity protection algorithms. When such a malformed message is processed, the core attempts to read beyond the allocated buffer boundaries, triggering a panic and crashing the core process. This results in a denial of service (DoS) condition that disrupts connectivity for all subscribers relying on the affected core. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and no user interaction (UI:N). While privileges are required (PR:L), no authentication is needed, meaning an attacker with network access to the NGAP interface can exploit this vulnerability. The vulnerability does not impact confidentiality or integrity but severely affects availability. No known exploits have been reported in the wild as of the publication date. The issue is resolved in version 1.5.1 of Ella Core, and users are advised to upgrade promptly to mitigate the risk.
Potential Impact
The primary impact of this vulnerability is a denial of service affecting availability. Organizations using vulnerable versions of Ella Core in their private 5G networks may experience unexpected core crashes, leading to service outages for all connected user equipment. This can disrupt critical communications, especially in industrial, enterprise, or specialized private network environments relying on 5G for operational continuity. The lack of confidentiality or integrity impact limits the scope to availability, but the ease of exploitation without authentication and the potential for widespread disruption in a core network component elevates the operational risk. Downtime in private 5G networks can affect manufacturing, logistics, healthcare, and other sectors increasingly dependent on reliable low-latency wireless connectivity. Additionally, the vulnerability could be leveraged as part of a larger attack chain to degrade network reliability or cause cascading failures in dependent systems.
Mitigation Recommendations
Organizations should immediately upgrade Ella Core to version 1.5.1 or later, where the vulnerability is fixed. Until the upgrade is applied, network administrators should restrict access to the NGAP interface to trusted entities only, implementing strict network segmentation and firewall rules to limit exposure to potentially malicious actors. Monitoring NGAP traffic for anomalous or malformed PathSwitchRequest messages can help detect exploitation attempts. Deploying intrusion detection or prevention systems with custom signatures targeting zero-length UE Security Capabilities bitstrings may provide additional protection. Regularly auditing and validating 5G core configurations and applying vendor security advisories promptly will reduce risk. Additionally, organizations should have incident response plans to quickly recover from core crashes and minimize downtime. Given the low complexity of exploitation, proactive patch management is the most effective mitigation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-11T21:16:21.661Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b3375b2f860ef94302458b
Added to database: 3/12/2026, 9:59:55 PM
Last enriched: 3/12/2026, 10:14:57 PM
Last updated: 3/12/2026, 11:00:26 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.