CVE-2021-44109
- EPSS 0.95%
- Veröffentlicht 05.04.2022 02:15:06
- Zuletzt bearbeitet 21.11.2024 06:30:22
A buffer overflow in lib/sbi/message.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request.
CVE-2021-44081
- EPSS 0.33%
- Veröffentlicht 29.03.2022 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:20
A buffer overflow vulnerability exists in the AMF of open5gs 2.1.4. When the length of MSIN in Supi exceeds 24 characters, it leads to AMF denial of service.
CVE-2021-45462
- EPSS 0.27%
- Veröffentlicht 23.12.2021 04:15:09
- Zuletzt bearbeitet 21.11.2024 06:32:15
In Open5GS 2.4.0, a crafted packet from UE can crash SGW-U/UPF.
CVE-2021-41794
- EPSS 0.4%
- Veröffentlicht 07.10.2021 15:15:11
- Zuletzt bearbeitet 21.11.2024 06:26:46
ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first chara...
CVE-2021-28122
- EPSS 1.1%
- Veröffentlicht 10.03.2021 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:59:07
A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For exa...
CVE-2021-25863
- EPSS 0.11%
- Veröffentlicht 26.01.2021 18:16:21
- Zuletzt bearbeitet 21.11.2024 05:55:32
Open5GS 2.1.3 listens on 0.0.0.0:3000 and has a default password of 1423 for the admin account.