Логотип exploitDog
bind:CVE-2023-37021
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-37021

Количество 3

Количество 3

nvd логотип

CVE-2023-37021

7 месяцев назад

Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2023-37021

7 месяцев назад

Open5GS MME version <= 2.6.4 contains an assertion that can be remotel ...

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-2g4r-3v66-3h7f

7 месяцев назад

Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-37021

Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.

CVSS3: 8.6
0%
Низкий
7 месяцев назад
debian логотип
CVE-2023-37021

Open5GS MME version <= 2.6.4 contains an assertion that can be remotel ...

CVSS3: 8.6
0%
Низкий
7 месяцев назад
github логотип
GHSA-2g4r-3v66-3h7f

Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.

CVSS3: 8.6
0%
Низкий
7 месяцев назад

Уязвимостей на страницу