Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33283: CWE-476: NULL Pointer Dereference in ellanetworks core

0
Medium
VulnerabilityCVE-2026-33283cvecve-2026-33283cwe-476
Published: Mon Mar 23 2026 (03/23/2026, 23:49:42 UTC)
Source: CVE Database V5
Vendor/Project: ellanetworks
Product: core

Description

CVE-2026-33283 is a medium-severity vulnerability in Ella Core, a 5G core designed for private networks. Versions prior to 1. 6. 0 are vulnerable to a NULL pointer dereference triggered by processing malformed UL NAS Transport messages lacking a Request Type. An unauthenticated attacker can send crafted NAS messages to cause the core process to panic and crash, resulting in denial of service and disruption of service for all connected subscribers. The vulnerability does not impact confidentiality or integrity but causes availability loss. Version 1. 6. 0 introduces a guard to prevent crashes when receiving such malformed messages. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:31:29 UTC

Technical Analysis

CVE-2026-33283 is a NULL pointer dereference vulnerability (CWE-476) affecting Ella Core, a 5G core solution used primarily in private 5G networks. The issue arises when the core processes uplink NAS Transport messages that are malformed by lacking a Request Type field. In versions prior to 1.6.0, this causes the core process to panic and crash due to dereferencing a NULL pointer, leading to a denial of service condition. The vulnerability requires no authentication and can be exploited remotely by sending crafted NAS messages to the core network component. The impact is limited to availability, as no confidentiality or integrity compromise is indicated. The vulnerability is addressed in version 1.6.0 by adding a guard clause that prevents dereferencing when no SM context exists and the Request Type is missing. The CVSS v3.1 base score is 6.5 (medium), reflecting the network attack vector, low attack complexity, no user interaction, and no impact on confidentiality or integrity. No public exploits or active exploitation have been reported to date. This vulnerability highlights the importance of robust input validation in telecom core network components, especially those handling critical signaling messages like NAS. Given the critical role of 5G core networks in subscriber connectivity, such crashes can cause significant service disruptions.

Potential Impact

The primary impact of this vulnerability is denial of service (DoS) against the affected 5G core network component, resulting in service disruption for all subscribers connected through the vulnerable Ella Core instance. This can lead to loss of network availability, affecting voice, data, and signaling services in private 5G deployments. While confidentiality and integrity are not directly impacted, the loss of availability can have severe operational consequences, especially in industrial, enterprise, or critical infrastructure environments relying on private 5G networks for communications. Attackers do not require authentication, increasing the risk of exploitation from within or near the network perimeter. The scope is limited to deployments using Ella Core versions prior to 1.6.0, but given the growing adoption of private 5G networks worldwide, the potential impact on organizations using this product can be significant. Disruptions could affect manufacturing, logistics, healthcare, or other sectors relying on private 5G for mission-critical applications.

Mitigation Recommendations

1. Upgrade affected Ella Core deployments to version 1.6.0 or later, which includes the fix preventing NULL pointer dereference on malformed NAS messages. 2. Implement network-level filtering and validation to detect and block malformed UL NAS Transport messages lacking a Request Type before they reach the core network. 3. Deploy anomaly detection systems to monitor NAS signaling traffic for unusual or malformed message patterns indicative of exploitation attempts. 4. Restrict access to the 5G core network interfaces to trusted sources only, minimizing exposure to unauthenticated attackers. 5. Conduct regular security assessments and fuzz testing on NAS message handling components to identify and remediate similar input validation issues proactively. 6. Maintain up-to-date incident response plans to quickly address service disruptions caused by potential exploitation. 7. Collaborate with the vendor for timely patches and security advisories related to Ella Core.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T18:55:47.425Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1e5e3f4197a8e3bb3f188

Added to database: 3/24/2026, 1:16:19 AM

Last enriched: 3/24/2026, 1:31:29 AM

Last updated: 3/24/2026, 2:37:36 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses