Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33281: CWE-129: Improper Validation of Array Index in ellanetworks core

0
Medium
VulnerabilityCVE-2026-33281cvecve-2026-33281cwe-129
Published: Mon Mar 23 2026 (03/23/2026, 23:46:12 UTC)
Source: CVE Database V5
Vendor/Project: ellanetworks
Product: core

Description

Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing NGAP messages with invalid PDU Session IDs outside of 1-15. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 added PDU Session ID validations during NGAP message handling.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:15:53 UTC

Technical Analysis

CVE-2026-33281 is a vulnerability identified in the Ella Core 5G core product designed for private network deployments. The core issue is an improper validation of array indices (CWE-129) related to PDU Session IDs in NGAP (Next Generation Application Protocol) messages. Specifically, versions of Ella Core prior to 1.6.0 do not validate that PDU Session IDs fall within the expected range of 1 to 15. When an NGAP message containing an out-of-range PDU Session ID is processed, the software panics, causing the core process to crash. This results in a denial-of-service condition, disrupting service for all connected subscribers. The vulnerability can be exploited remotely without authentication or user interaction, as NGAP messages are part of the signaling protocol between the 5G core and radio access network elements. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on availability but no impact on confidentiality or integrity. The vendor addressed this vulnerability in version 1.6.0 by implementing proper validation checks on PDU Session IDs during NGAP message processing, preventing out-of-range values from causing crashes. No public exploits or active exploitation have been reported to date.

Potential Impact

The primary impact of this vulnerability is a denial-of-service condition affecting the availability of the 5G core network services managed by Ella Core. Since the core process crashes upon receiving malformed NGAP messages, all subscribers connected to the affected core instance will experience service disruption, potentially leading to loss of connectivity, dropped sessions, and degraded network performance. This can affect private 5G network operators relying on Ella Core for mission-critical communications, industrial automation, or enterprise connectivity. The impact on confidentiality and integrity is negligible, as the vulnerability does not allow data leakage or unauthorized modification. However, the ease of exploitation—requiring no authentication and only crafted NGAP messages—makes it a significant risk for service availability. Organizations operating private 5G networks with affected versions may face operational downtime, customer dissatisfaction, and potential financial losses. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers could develop exploits given the public disclosure.

Mitigation Recommendations

Organizations using Ella Core versions prior to 1.6.0 should prioritize upgrading to version 1.6.0 or later, where the vulnerability is patched with proper PDU Session ID validation. In environments where immediate upgrade is not feasible, network operators should implement strict filtering and validation of NGAP messages at the network edge or firewall to block malformed or out-of-range PDU Session IDs. Monitoring NGAP traffic for anomalous or unexpected session IDs can help detect attempted exploitation. Additionally, deploying redundancy and failover mechanisms for the 5G core can minimize service disruption in case of a crash. Network segmentation and limiting exposure of the NGAP interface to trusted network segments can reduce the attack surface. Regular security assessments and penetration testing focused on signaling protocols can help identify similar vulnerabilities proactively. Finally, maintaining up-to-date incident response plans for 5G core outages will improve resilience against denial-of-service attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T18:55:47.425Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1d434f4197a8e3ba042b3

Added to database: 3/24/2026, 12:00:52 AM

Last enriched: 3/24/2026, 12:15:53 AM

Last updated: 3/24/2026, 4:42:06 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses