Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32320: CWE-125: Out-of-bounds Read in ellanetworks core

0
Medium
VulnerabilityCVE-2026-32320cvecve-2026-32320cwe-125
Published: Thu Mar 12 2026 (03/12/2026, 21:34:50 UTC)
Source: CVE Database V5
Vendor/Project: ellanetworks
Product: core

Description

CVE-2026-32320 is an out-of-bounds read vulnerability in Ella Core, a 5G core network product designed for private networks. Versions prior to 1. 5. 1 panic when processing a PathSwitchRequest message containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings. This causes the core process to crash, resulting in a denial of service that disrupts service for all connected subscribers. Exploitation requires no authentication and no user interaction, as an attacker only needs to send crafted NGAP messages. The vulnerability is fixed in version 1. 5. 1. The CVSS score is 6.

AI-Powered Analysis

AILast updated: 03/12/2026, 22:14:57 UTC

Technical Analysis

CVE-2026-32320 is a vulnerability classified as CWE-125 (Out-of-bounds Read) affecting Ella Core, a 5G core network product used primarily in private 5G deployments. The flaw exists in versions prior to 1.5.1, where the core improperly handles PathSwitchRequest NGAP messages containing UE Security Capabilities fields with zero-length bitstrings for NR encryption or integrity protection algorithms. When such a malformed message is processed, the core attempts to read beyond the allocated buffer boundaries, triggering a panic and crashing the core process. This results in a denial of service (DoS) condition that disrupts connectivity for all subscribers relying on the affected core. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and no user interaction (UI:N). While privileges are required (PR:L), no authentication is needed, meaning an attacker with network access to the NGAP interface can exploit this vulnerability. The vulnerability does not impact confidentiality or integrity but severely affects availability. No known exploits have been reported in the wild as of the publication date. The issue is resolved in version 1.5.1 of Ella Core, and users are advised to upgrade promptly to mitigate the risk.

Potential Impact

The primary impact of this vulnerability is a denial of service affecting availability. Organizations using vulnerable versions of Ella Core in their private 5G networks may experience unexpected core crashes, leading to service outages for all connected user equipment. This can disrupt critical communications, especially in industrial, enterprise, or specialized private network environments relying on 5G for operational continuity. The lack of confidentiality or integrity impact limits the scope to availability, but the ease of exploitation without authentication and the potential for widespread disruption in a core network component elevates the operational risk. Downtime in private 5G networks can affect manufacturing, logistics, healthcare, and other sectors increasingly dependent on reliable low-latency wireless connectivity. Additionally, the vulnerability could be leveraged as part of a larger attack chain to degrade network reliability or cause cascading failures in dependent systems.

Mitigation Recommendations

Organizations should immediately upgrade Ella Core to version 1.5.1 or later, where the vulnerability is fixed. Until the upgrade is applied, network administrators should restrict access to the NGAP interface to trusted entities only, implementing strict network segmentation and firewall rules to limit exposure to potentially malicious actors. Monitoring NGAP traffic for anomalous or malformed PathSwitchRequest messages can help detect exploitation attempts. Deploying intrusion detection or prevention systems with custom signatures targeting zero-length UE Security Capabilities bitstrings may provide additional protection. Regularly auditing and validating 5G core configurations and applying vendor security advisories promptly will reduce risk. Additionally, organizations should have incident response plans to quickly recover from core crashes and minimize downtime. Given the low complexity of exploitation, proactive patch management is the most effective mitigation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3375b2f860ef94302458b

Added to database: 3/12/2026, 9:59:55 PM

Last enriched: 3/12/2026, 10:14:57 PM

Last updated: 3/12/2026, 11:00:26 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses