Published Product Vulnerabilities

LAST UPDATED: APR 16, 2025

CVEID
ZDI-CAN-23960

CVSS Score
5.3 Medium

PRODUCT
AP5GC

VERSION
2403.0-2

ATTACK VECTOR
Adjacent

PROBLEM TYPE
Microsoft Azure Private 5G Core Un-Authenticated Base Station Override

REFERENCES
https://www.trendmicro.com/en_us/research/24/i/vulnerabilities-in-cellular-packet-cores-part-iv-authentication.html

DESCRIPTION
An arbitrary NGSetupRequest sent to AP5GC, with the ID of a legitimate base station, can eject the original legitimate base station(gNB) from the network. Cellular devices served by the original base station will be forced to disconnect. A malicious base station can replace the original legitimate base station.

DATE
2024-08-23

CVEID
CVE-2024-20685

CVSS Score
5.9 Medium

PRODUCT
AP5GC

VERSION
2403.0-2

ATTACK VECTOR
Network

PROBLEM TYPE
Azure Private 5G Core Denial of Service Vulnerability.

REFERENCES
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20685
https://www.trendmicro.com/en_us/research/24/i/vulnerabilities-in-cellular-packet-cores-part-iv-authentication.html

DESCRIPTION
By sending a crafted malformed UE Registration message, an attacker can cause a denial-of-service in AP5GC. All cellular devices in the network will lose connectivity.

DATE
2024-04-09

CVEID
CVE-2023-41628

CVSS Score
7.5 High

PRODUCT
Software Community E2

VERSION
G Release

ATTACK VECTOR
3rd party app

PROBLEM TYPE
An issue in O-RAN Software Community E2 G-Release allows attackers to cause a Denial of Service (DoS) by incorrectly initiating the messaging procedure between the E2Node and E2Term components.

REFERENCES
https://jira.o-ran-sc.org/browse/RIC-1002
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/open-ran-attack-of-the-xapps

DESCRIPTION

The vulnerability arises from faulty message handling, Out-of-Order messages can occur in networks due to various reasons; sometimes because a message gets lost in transit, sometimes because of sender malfunctioning, or sometimes an attacker injects such a message.

If not handled properly, out-of-order messages can disrupt the receiver’s processing flow, leading to unexpected behavior.

DATE
2023-09-01

CVEID
CVE-2023-41627

CVSS Score
7.5 High

PRODUCT
O-RAN Software Community ric-plt-lib-rmr

VERSION
4.9.0

ATTACK VECTOR
3rd party app

PROBLEM TYPE
O-RAN Software Community ric-plt-lib-rmr v4.9.0 does not validate the source of the routing tables it receives, potentially allowing attackers to send forged routing tables to the device.

REFERENCES
https://jira.o-ran-sc.org/browse/RIC-1001
https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html

DESCRIPTION
E2Term relies on the route table information sent by the Routing Manager at regular intervals to establish communication with other components within the RIC system. However, E2Term does not validate the sender of the route table information it receives. This lack of validation allows an attacker to exploit CVE-2023-41627 by sending forged route table information to E2Term. By sending this information to E2Term at a higher frequency using the Routing Manager, an attacker can deceive E2Term and disrupt its communication with other components.

DATE
2023-09-01

CVEID
CVE-2023-40998

CVSS Score
7.5 High

PRODUCT
O-RAN Software Community ric-plt-lib-rmr

VERSION
4.9.0

ATTACK VECTOR
3rd party app

PROBLEM TYPE
Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via the packet size component.

REFERENCES
https://jira.o-ran-sc.org/browse/RIC-989
https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html

DESCRIPTION
The CVE-2023-40998 vulnerability involves incorrect packet information that can result in a negative packet size during decoding, leading to a crash when performing the memcpy operation.

DATE
2023-08-28

CVEID
CVE-2023-40997

CVSS Score
7.5 High

PRODUCT
O-RAN Software Community ric-plt-lib-rmr

VERSION
4.9.0

ATTACK VECTOR
3rd party app

PROBLEM TYPE
Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via a crafted packet.

REFERENCES
https://www.trendmicro.com/en_us/research/23/l/the-current-state-of-open-ran-security.html
https://jira.o-ran-sc.org/browse/RIC-991
https://ieeexplore.ieee.org/document/10433004

DESCRIPTION
CVE-2023-40997 involves a sent packet that cannot be properly decoded, causing an incorrect memory address calculation and resulting in an E2Term crash.

DATE
2023-08-28

CVEID
CVE-2022-43677

CVSS Score
5.5 Medium

PRODUCT
Free 5GC

VERSION
3.2.1

ATTACK VECTOR
Connected device

PROBLEM TYPE
In free5GC 3.2.1, a malformed NGAP message can crash the AMF and NGAP decoders via an index-out-of-range panic in aper.GetBitString.

REFERENCES
https://www.trendmicro.com/en_us/research/23/j/asn1-vulnerabilities-in-5g-cores.html
https://github.com/free5gc/free5gc/issues/402

DESCRIPTION
An adversary-controlled UE may be used to send a GTP-U packet to UPF/PGW with a malicious payload to evade UPF/PGW routing controls to establish communications with a core NF. If UPF/PGW does not do proper parameter checks, it may route the packet to an improper destination such as a core network function in the control plane e.g. SMF, it can cause the NF to go to an undefined state and the NF may crash.

DATE
2022-10-24

CVEID
ZDI-CAN-18522

CVSS Score
8.3 High

PRODUCT
Nokia CMU

VERSION
N/A

ATTACK VECTOR
Remote, Network

PROBLEM TYPE
The adversary establishes a two-way communication with the victim UE. Once the session is established, the adversary can launch further attacks such as inserting malware, execute Remote Procedure Call (RPC) etc. UEs in private subnet become exposed to attacks from outside.

REFERENCES
https://documents.trendmicro.com/assets/white_papers/Looking-In-How-a-Packet-Reflection-Vulnerability-Could-Allow-Attackers-to-Infiltrate-Internal-5G-Networks.pdf

DESCRIPTION
We were able to exploit the GTP-U to attack connected devices from external networks, taking advantage of a packet reflection vulnerability in 5G core UPFs. This security gap is borne from the lack of IP cross-checking between the control and data planes in packet cores.

DATE
2022-08-08

CVEID
CVE-2021-45462

CVSS Score
7.5 High

PRODUCT
Open5GS

VERSION
2.4.0

ATTACK VECTOR
Connected device, Network

PROBLEM TYPE
In Open5GS 2.4.0, a crafted packet from UE can crash SGW-U/UPF.

REFERENCES
https://github.com/open5gs/open5gs/commit/a0f2535cb5a29bba6dbbccdb90c74ccd770cc700
https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html

DESCRIPTION
Two concepts that can exploit the GTP-U using CVE-2021-45462. In Open5GS, a C-language open-source implementation for 5G Core and Evolved Packet Core (EPC), sending a zero-length, type=255 GTP-U packet from the user device resulted in a denial of service (DoS) of the UPF.

This is CVE-2021-45462, a security gap in the packet core that can crash the UPF (in 5G) or Serving Gateway User Plane Function (SGW-U in 4G/LTE) via an anomalous GTP-U packet crafted from the UE and by sending this anomalous GTP-U packet in the GTP-U. Given that the exploit affects a critical component of the infrastructure and cannot be resolved as easily, the vulnerability has received a Medium to High severity rating.

DATE
2021-12-23

CVEID
ZDI-CAN-14043

CVSS Score

PRODUCT
Open5GS

VERSION
2.2.9

ATTACK VECTOR
Connected device, Network

PROBLEM TYPE
An adversary controlled UE may be used to send crafted NAS messages to AMF to crash or slow down the AMF.

REFERENCES
https://github.com/open5gs/open5gs/commit/00c96a3f0ffd12c4330bee9a3f9596f8e4b86b6f

DESCRIPTION
AMF processes registration request messages from UE and it works with other NFs in the core to respond to those messages. By sending crafted NAS messages from UE, an adversary may force 5G core AMF or other Control Plane functions to go into undefined states, and might result in DoS. UEs use NAS connection (via N1 interface) to the core AMF function. A specially crafted message can be used to cause coding or parsing error which can potentially crash the AMF. Existing UEs and new UEs may not be able to get service from the 5G network.

DATE
2021-06-01

Advantech

Advantech's LTE and 5G NR industrial routers meet regional frequency and certification standards, supporting cloud management (WebAccess/DMP) and zero-touch deployment. With ICR-OS, we provide ready-to-use apps, programmable features, and an open SDK for custom applications. In partnership with CTOne’s security solution, we enhance our service offerings, provide enterprise-grade security for CIoT devices, while reducing TCO and simplifying maintenance

Proscend

Proscend Communications is the leading brand of industrial 4G/5G gateway in Taiwanese Smart City market, focusing on CT (communication technology) solution for various Industrial IoT (IIoT) applications.

By integrating Proscend’s 4G/5G gateways with CTOne’s public mobile network security solution, we effectively address cyber threats in wide-area networks. Our joint solution ensures secure connectivity and protection for numerous IIoT sites operating on 4G/5G public networks without fixed IP addresses.

O'Prueba

O'Prueba specializes in Edge AI Service Gateway solutions. In collaboration with CTOne, its security features can be seamlessly deployed to numerous edge IoT endpoints with a single click via the O'Prueba OOS platform. This integration enables businesses to accelerate deployment, enhance data protection, and drive innovation toward digital transformation.

Clarity

Together with Claroty, we enhance enterprise operational & cyber resiliency for critical infrastructure and secure Cyber-Physical Systems in traditional and hybrid private cellular (5G/LTE) environments.

Netcube Inc.

Netcube is a leader in mobility management solutions for enterprise networking, renowned for its acclaimed authentication and IP automation technologies. Netcube also specializes in implementing 5G connectivity across various industry applications. As an official sales channel partner of CTOne in Korea, we collaborate to offer private 5G enabler solutions with comprehensive security measures. These solutions leverage network slicing-based security controls and ensure industry-specific guaranteed mobility networking.

SpectrEdge

As a professional 5G telecommunication networking solution vendor,  SpectrEdge and CTOne combined solution delivers rapidly deployable 5G Networking with Industry-Leading Security designed for financial, defense, and public safety markets.

Neutroon

Neutroon and CTOne revolutionize wireless management and cybersecurity, offering 'API First' network control, security, and edge orchestration. Neutroon's unified management spans radio, core, devices, and applications, while CTOne enhances end-to-end security. This collaboration empowers CSPs and enterprises with a scalable, intelligent platform for 5G/LTE.

Pegatron

With a strong focus on operational security, the combination of Pegatron`s end-to-end private 5G offerings and CTOne`s cybersecurity solution enables a more effective approach to enabling smart factories. By addressing critical operational and cybersecurity needs, the joint solution enables modern enterprises to realize the true value of next-generation wireless deployment in their smart factories.

Nexcom

As a certified hardware platform partner, NEXCOM’s hardware appliances have been tested and certified as compatible with CTOne's virtualized private 5G security solution. As a certified solution, global organizations are able to confidently harness the power of CTOne’s leading cybersecurity capabilities in combination with NEXCOM's extensive capabilities in Edge AI, Fixed Wireless Access (FWA), private 5G, and secure IoT connectivity.

Saviah

The joint Saviah-CTOne solution leverages Saviah's cost-effective, high-performance, reliable, and interoperable industrial-grade 5GC service and CTOne's proven end-to-end security. The result: a more secure and easier to manage private mobile network environment for enterprises with the ability to leverage the major features and versatility of 5G.

Inventec

Securing OT environments connected to CT networks, the integration of Inventec's Smart Factory DX solution with CTOne extends our security capabilities beyond CT into OT. With our joint solution, we offer enterprises an end-to-end service encompassing IT, OT, and CT, complete with a holistic cybersecurity strategy to support enterprises during digital transformation.

Ataya

The integration of Ataya’s Harmony solution with CTOne provides enterprises with comprehensive connectivity and security visibility across 5G, Wi-Fi, and wired networks. With this joint solution for hybrid networks, enterprises gain full security visibility into Ataya’s Universal Connectivity Platform while supporting a zero-trust strategy and reducing the effort and cost associated with security management.

This website uses cookies for website functionality, traffic analytics, personalization, social media functionality and advertising. Our Cookie Notice provides more information and explains how to amend your cookie settings. Learn more