First published: Wed Nov 15 2023(Updated: )
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Free5gc Free5gc | =3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-47347.
The title of the vulnerability is 'Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes.'
The affected software is Free5gc version 3.3.0.
The severity of the vulnerability is high with a CVSS score of 7.5.
The vulnerability can be exploited by sending crafted PFCP messages with a mutated Sequence Number, causing a buffer overflow and resulting in a denial of service.