Skip to content

Commit e66ecd8

Browse files
1 parent 6f33d7f commit e66ecd8

2 files changed

Lines changed: 124 additions & 0 deletions

File tree

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6gm8-3g4h-w82m",
4+
"modified": "2026-04-01T22:59:13Z",
5+
"published": "2026-04-01T22:59:12Z",
6+
"aliases": [
7+
"CVE-2026-34761"
8+
],
9+
"summary": "Ella Core Panics Upon NGAP handover failure",
10+
"details": "## Summary\n\nElla Core panics when processing a NGAP handover failure message.\n\n## Impact\n\nIf an attacker can force a gNodeB to send NGAP handover failure messages to Ella Core, the process will crash, thereby disrupting service for all connected subscribers.\n\n## Fix \n\nImprove guards in NGAP handover handlers.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/ellanetworks/core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.8.0"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 1.7.0"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/ellanetworks/core/security/advisories/GHSA-6gm8-3g4h-w82m"
45+
},
46+
{
47+
"type": "PACKAGE",
48+
"url": "https://github.com/ellanetworks/core"
49+
}
50+
],
51+
"database_specific": {
52+
"cwe_ids": [
53+
"CWE-476"
54+
],
55+
"severity": "MODERATE",
56+
"github_reviewed": true,
57+
"github_reviewed_at": "2026-04-01T22:59:12Z",
58+
"nvd_published_at": null
59+
}
60+
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xw45-cc32-442f",
4+
"modified": "2026-04-01T22:59:50Z",
5+
"published": "2026-04-01T22:59:50Z",
6+
"aliases": [
7+
"CVE-2026-34762"
8+
],
9+
"summary": "Ella Core Has Audit Log Falsification via Path/Body IMSI Mismatch in UpdateSubscriber",
10+
"details": "## Summary\n\nThe `PUT /api/v1/subscriber/{imsi}` API accepts an IMSI identifier from both the URL path and the JSON request body but never verifies they match. This allows an authenticated NetworkManager to modify any subscriber's policy while the audit trail records a fabricated or unrelated subscriber IMSI.\n\n## Impact\n\nA NetworkManager or Admin can modify any subscriber's QoS policy (potentially degrading service or altering traffic routing) while the audit log attributes the change to a non-existent or unrelated subscriber. Post-incident forensic searches for the affected subscriber's IMSI would find no matching audit entries.\n\n## Fix\n\nRemove the IMSI as a body param and use the path param as a single source of truth.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/ellanetworks/core"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.8.0"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 1.7.0"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/ellanetworks/core/security/advisories/GHSA-xw45-cc32-442f"
45+
},
46+
{
47+
"type": "WEB",
48+
"url": "https://github.com/ellanetworks/core/commit/7f64b7a7c7a22cb9c05ac2c1c3a0cf0eaefac3e5"
49+
},
50+
{
51+
"type": "PACKAGE",
52+
"url": "https://github.com/ellanetworks/core"
53+
}
54+
],
55+
"database_specific": {
56+
"cwe_ids": [
57+
"CWE-20"
58+
],
59+
"severity": "LOW",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2026-04-01T22:59:50Z",
62+
"nvd_published_at": null
63+
}
64+
}

0 commit comments

Comments
 (0)