CVE-2023-47345
 
Severity Score
7.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero.
La vulnerabilidad de desbordamiento del búfer en free5gc 3.3.0 permite a los atacantes provocar una denegación de servicio a través de un mensaje PFCP manipulado con un mensaje PFCP Heartbeat mal formado cuya longitud Recovery Time Stamp IE está mutada a cero.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-11-06 CVE Reserved
- 2023-11-15 CVE Published
- 2024-08-29 CVE Updated
- 2024-08-29 First Exploit
- 2024-11-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/free5gc/free5gc/issues/483 | 2024-08-29 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|