First published: Mon Oct 23 2023(Updated: )
pkg/suci/suci.go in free5GC udm before 1.2.0, when Go before 1.19 is used, allows an Invalid Curve Attack because it may compute a shared secret via an uncompressed public key that has not been validated. An attacker can send arbitrary SUCIs to the UDM, which tries to decrypt them via both its private key and the attacker's public key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/free5gc/udm | <1.2.0 | 1.2.0 |
free5GC UDM | <1.2.0 | |
Golang | <1.19 | |
All of | ||
free5GC UDM | <1.2.0 | |
Golang | <1.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46324 is a vulnerability in free5GC udm (User Data Management) before version 1.2.0 when using Go before version 1.19.
The severity of CVE-2023-46324 is high with a CVSS score of 7.5.
CVE-2023-46324 occurs in pkg/suci/suci.go in free5GC udm due to the computation of a shared secret using an uncompressed public key that has not been validated.
An attacker can exploit CVE-2023-46324 by sending arbitrary SUCIs (Subscription Concealed Identifier) to the UDM, which attempts to decrypt them using its private key.
To fix CVE-2023-46324, it is recommended to update to free5GC udm version 1.2.0 and use Go version 1.19 or newer.