Description
A vulnerability was determined in omec-project amf up to 2.1.3-dev. Impacted is the function NGSetupRequest of the file ngap/handler.go. Executing a manipulation of the argument InformationElement can lead to memory corruption. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.2.0 is recommended to address this issue. The affected component should be upgraded. The same pull request fixes multiple security issues.
Problem types
Product status
2.2.0
Timeline
| 2026-05-17: | Advisory disclosed |
| 2026-05-17: | VulDB entry created |
| 2026-05-17: | VulDB entry last update |
Credits
shovon0203 (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/364403 (VDB-364403 | omec-project amf handler.go NGSetupRequest memory corruption)
vuldb.com/vuln/364403/cti (VDB-364403 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/811616 (Submit #811616 | Linux Foundation Projects SD-Core 2.1.1 Memory Corruption)
github.com/omec-project/amf/issues/671
github.com/omec-project/amf/pull/666
github.com/omec-project/amf/releases/tag/v2.2.0
github.com/omec-project/amf/