CVE-2026-34761
Received Received - Intake
Denial of Service via NGAP Handover Failure in Ella Core

Publication date: 2026-04-02

Last updated on: 2026-04-07

Assigner: GitHub, Inc.

Description
Ella Core is a 5G core designed for private networks. Prior to version 1.8.0, Ella Core panics when processing a NGAP handover failure message. An attacker able to cause a gNodeB to send NGAP handover failure messages to Ella Core can crash the process, causing service disruption for all connected subscribers. This issue has been patched in version 1.8.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-07
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ellanetworks ella_core to 1.8.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability causes a denial of service by crashing the Ella Core process when processing certain NGAP handover failure messages, leading to service disruption for all connected subscribers.

However, there is no indication from the provided information that this vulnerability results in data disclosure, data modification, or any breach of confidentiality or integrity.

Because the vulnerability impacts availability but not confidentiality or integrity, its effect on compliance with standards like GDPR or HIPAAβ€”which emphasize data protection and privacyβ€”would primarily relate to service availability requirements.

No explicit information is provided about how this vulnerability affects compliance with these regulations.


Can you explain this vulnerability to me?

CVE-2026-34761 is a vulnerability in Ella Core, a 5G core software designed for private networks. Prior to version 1.8.0, the software would panic and crash when processing a specific NGAP (Next Generation Application Protocol) handover failure message. This happens due to a NULL pointer dereference caused by insufficient validation in the NGAP handover failure message handlers.

An attacker who can cause a gNodeB (5G base station) to send these crafted NGAP handover failure messages to Ella Core can trigger this crash, leading to a denial of service by disrupting the process that handles all connected subscribers.

This vulnerability was fixed in version 1.8.0 by improving input validation and adding guards to prevent the NULL pointer dereference and subsequent panics.


How can this vulnerability impact me? :

This vulnerability can cause a denial of service by crashing the Ella Core process when it receives a malicious NGAP handover failure message. As a result, all connected subscribers relying on the affected Ella Core instance will experience service disruption.

The impact is significant in environments using Ella Core for 5G private networks, as the crash affects availability of the service but does not compromise confidentiality or integrity of data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability causes the Ella Core process to panic and crash when processing NGAP handover failure messages. Detection can involve monitoring the Ella Core logs or process status for unexpected crashes or panics related to NGAP handover failure handling.

Additionally, the v1.8.0 release introduces new user plane metrics such as app_xdp_fib_lookup_total and app_xdp_ifindex_mismatch_total for enhanced observability, which may help in monitoring the system's health and detecting anomalies.

Specific commands are not provided in the available resources, but general detection steps could include:

  • Checking system logs or Ella Core logs for panic or crash messages related to NGAP handover failure.
  • Using process monitoring tools (e.g., systemctl status, ps, or top) to detect if the Ella Core process unexpectedly stops.
  • Monitoring the new user plane metrics if using version 1.8.0 or later for unusual values indicating issues.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade Ella Core to version 1.8.0 or later, where the vulnerability has been fixed by improving input validation and guards in the NGAP handover failure message handlers to prevent panics.

Until the upgrade can be applied, consider restricting or controlling the ability of potentially untrusted gNodeBs to send NGAP handover failure messages to the Ella Core to reduce the risk of exploitation.

Monitoring the system for crashes and applying any available patches or updates promptly is also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart