24429mp4 -
Ensure Open5GS is updated to a version newer than 2.6.4 (such as version 2.7.0 or later), where this assertion logic has been hardened.
The vulnerability stems from a "reachable assertion" within the nas_eps_send_emm_to_esm function. In software development, an assertion is a check that the code assumes to be true; if it fails, the program usually crashes immediately to prevent further errors. 24429mp4
When the system processes this malicious packet, it hits the failed assertion and shuts down. In a mobile network environment, this results in a Denial of Service , potentially cutting off connectivity for users serviced by that core. Recommendations Ensure Open5GS is updated to a version newer than 2
Typically rated as high, as it impacts the availability of core mobile network functions. Technical Breakdown When the system processes this malicious packet, it
Implement network-level filtering to ensure that NGAP traffic is only accepted from trusted, authorized network nodes (GNBs/Access Points).
Open5GS versions up to and including 2.6.4