{ "id": "CVE-2023-37015", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:11.100", "lastModified": "2025-01-22T15:15:11.100", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Path Switch Request` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service." }, { "lang": "es", "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Solicitud de cambio de ruta\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", "source": "cve@mitre.org" } ] }