CVE-2026-34761
Denial of Service via NGAP Handover Failure in Ella Core
Publication date: 2026-04-02
Last updated on: 2026-04-07
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ellanetworks | ella_core | to 1.8.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability causes a denial of service by crashing the Ella Core process when processing certain NGAP handover failure messages, leading to service disruption for all connected subscribers.
However, there is no indication from the provided information that this vulnerability results in data disclosure, data modification, or any breach of confidentiality or integrity.
Because the vulnerability impacts availability but not confidentiality or integrity, its effect on compliance with standards like GDPR or HIPAAβwhich emphasize data protection and privacyβwould primarily relate to service availability requirements.
No explicit information is provided about how this vulnerability affects compliance with these regulations.
Can you explain this vulnerability to me?
CVE-2026-34761 is a vulnerability in Ella Core, a 5G core software designed for private networks. Prior to version 1.8.0, the software would panic and crash when processing a specific NGAP (Next Generation Application Protocol) handover failure message. This happens due to a NULL pointer dereference caused by insufficient validation in the NGAP handover failure message handlers.
An attacker who can cause a gNodeB (5G base station) to send these crafted NGAP handover failure messages to Ella Core can trigger this crash, leading to a denial of service by disrupting the process that handles all connected subscribers.
This vulnerability was fixed in version 1.8.0 by improving input validation and adding guards to prevent the NULL pointer dereference and subsequent panics.
How can this vulnerability impact me? :
This vulnerability can cause a denial of service by crashing the Ella Core process when it receives a malicious NGAP handover failure message. As a result, all connected subscribers relying on the affected Ella Core instance will experience service disruption.
The impact is significant in environments using Ella Core for 5G private networks, as the crash affects availability of the service but does not compromise confidentiality or integrity of data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability causes the Ella Core process to panic and crash when processing NGAP handover failure messages. Detection can involve monitoring the Ella Core logs or process status for unexpected crashes or panics related to NGAP handover failure handling.
Additionally, the v1.8.0 release introduces new user plane metrics such as app_xdp_fib_lookup_total and app_xdp_ifindex_mismatch_total for enhanced observability, which may help in monitoring the system's health and detecting anomalies.
Specific commands are not provided in the available resources, but general detection steps could include:
- Checking system logs or Ella Core logs for panic or crash messages related to NGAP handover failure.
- Using process monitoring tools (e.g., systemctl status, ps, or top) to detect if the Ella Core process unexpectedly stops.
- Monitoring the new user plane metrics if using version 1.8.0 or later for unusual values indicating issues.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to upgrade Ella Core to version 1.8.0 or later, where the vulnerability has been fixed by improving input validation and guards in the NGAP handover failure message handlers to prevent panics.
Until the upgrade can be applied, consider restricting or controlling the ability of potentially untrusted gNodeBs to send NGAP handover failure messages to the Ella Core to reduce the risk of exploitation.
Monitoring the system for crashes and applying any available patches or updates promptly is also recommended.