OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-amf/-/issues/78 |
|
History
Thu, 09 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-294 | |
| Metrics |
cvssV3_1
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openairinterface
Openairinterface oai-cn5g-amf |
|
| Vendors & Products |
Openairinterface
Openairinterface oai-cn5g-amf |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenAirInterface 2.2.0 Security Mode Complete Accepts IA0 Leading to Replay Attack | |
| Weaknesses | CWE-290 CWE-322 |
Wed, 08 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-04-08T00:00:00.000Z
Updated: 2026-04-09T20:45:42.267Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30080
No data.
Status : Undergoing Analysis
Published: 2026-04-08T17:21:18.623
Modified: 2026-04-09T21:16:07.767
Link: CVE-2026-30080
No data.