Ella Core panics on invalid PDU Session IDs in NGAP messages
Description
Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing NGAP messages with invalid PDU Session IDs outside of 1-15. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 added PDU Session ID validations during NGAP message handling.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2026-33281 is an unauthenticated denial-of-service vulnerability in Ella Core 5G networks where crafted NGAP messages with invalid PDU Session IDs (outside 1-15) cause a process panic and crash.
Root
Cause
Ella Core, a 5G core for private networks, prior to version 1.6.0, fails to validate PDU Session ID values when processing NGAP (Next Generation Application Protocol) messages. The specification reserves PDU Session IDs in the range 1-15 for assignment procedures, but the core does not check for values outside this range [1][3]. When an invalid ID is received, the software encounters an unexpected condition and panics, leading to a complete process crash.
Attack
Surface
An attacker can send a single crafted NGAP message containing an invalid PDU Session ID to any reachable Ella Core instance. No authentication is required, and the attack can be launched remotely, as the NGAP interface is typically exposed to the radio access network (RAN) or potentially to adjacent networks depending on deployment [1]. The attack complexity is low because no special privileges or user interaction are needed.
Impact
A successful crash causes immediate denial of service for all subscribers currently connected through that core instance. Since Ella Core is designed as a single-binary, lightweight core—often deployed for critical private network use cases—the service disruption halts all 5G connectivity for the entire deployment [2]. The attempt can be repeated indefinitely to maintain the denial of service.
Mitigation
The vulnerability is patched in Ella Core version 1.6.0, which adds proper validation of PDU Session IDs during NGAP message processing [1]. Users must upgrade to this version or later. No workarounds are mentioned; however, network segmentation can limit exposure of the NGAP interface to trusted RAN nodes only.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/ellanetworks/coreGo | < 1.6.0 | 1.6.0 |
Affected products
2- ellanetworks/corev5Range: < 1.6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-q669-4gmv-g8mfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33281ghsaADVISORY
- github.com/ellanetworks/core/security/advisories/GHSA-q669-4gmv-g8mfghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.