### [CVE-2024-24450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24450) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE. ### POC #### Reference - https://cellularsecurity.org/ransacked #### Github - https://github.com/SpiralBL0CK/-CVE-2024-24450- - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/plzheheplztrying/cve_monitor