Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32320: CWE-125: Out-of-bounds Read in ellanetworks core

0
Medium
VulnerabilityCVE-2026-32320cvecve-2026-32320cwe-125
Published: Thu Mar 12 2026 (03/12/2026, 21:34:50 UTC)
Source: CVE Database V5
Vendor/Project: ellanetworks
Product: core

Description

Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a PathSwitchRequest containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings, resulting in a denial of service. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. This vulnerability is fixed in 1.5.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:22:20 UTC

Technical Analysis

CVE-2026-32320 is a medium-severity vulnerability classified as CWE-125 (Out-of-bounds Read) found in Ella Core, a 5G core network product developed by ellanetworks for private 5G deployments. The vulnerability arises when the core processes a PathSwitchRequest NGAP message containing UE Security Capabilities fields with zero-length bitstrings for NR encryption or integrity protection algorithms. This malformed input causes the core to perform an out-of-bounds read, leading to a panic and crash of the core process. Since the core handles subscriber sessions, this crash results in a denial of service affecting all connected subscribers. The vulnerability can be exploited remotely by an attacker capable of sending crafted NGAP messages to the core, without requiring authentication or user interaction. The affected versions are all releases prior to 1.5.1, where the issue has been fixed. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high availability impact. No public exploits are known at this time, but the ease of triggering a DoS condition on a critical 5G core component makes this a significant risk for private 5G network operators using vulnerable versions.

Potential Impact

The primary impact of this vulnerability is a denial of service on the 5G core network component, which can disrupt connectivity for all subscribers connected through the affected Ella Core instance. This can cause service outages in private 5G networks, affecting enterprise operations, industrial automation, or other critical applications relying on continuous 5G connectivity. Since the vulnerability requires no authentication and can be triggered remotely, attackers with network access to the NGAP interface can cause widespread disruption. The loss of availability in a 5G core can have cascading effects on dependent services, potentially impacting operational continuity, safety systems, and business-critical communications. While confidentiality and integrity are not directly impacted, the availability impact alone can be severe for organizations relying on private 5G deployments for mission-critical functions.

Mitigation Recommendations

Organizations using Ella Core should upgrade to version 1.5.1 or later, where this vulnerability is fixed. Until the upgrade can be performed, network administrators should restrict access to the NGAP interface to trusted and authenticated entities only, using network segmentation, firewall rules, and strict access controls to prevent unauthorized message injection. Monitoring NGAP traffic for anomalous or malformed PathSwitchRequest messages can help detect attempted exploitation. Implementing rate limiting on NGAP message processing may reduce the risk of DoS from repeated exploitation attempts. Additionally, organizations should maintain up-to-date incident response plans for 5G core outages and coordinate with ellanetworks for any patches or advisories. Regular vulnerability scanning and penetration testing focused on 5G core components can help identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3375b2f860ef94302458b

Added to database: 3/12/2026, 9:59:55 PM

Last enriched: 3/20/2026, 2:22:20 AM

Last updated: 4/27/2026, 3:28:24 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses