{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T02:09:47.500","vulnerabilities":[{"cve":{"id":"CVE-2026-33281","sourceIdentifier":"security-advisories@github.com","published":"2026-03-24T00:16:30.200","lastModified":"2026-03-24T19:36:10.893","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing NGAP messages with invalid PDU Session IDs outside of 1-15. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 added PDU Session ID validations during NGAP message handling."},{"lang":"es","value":"Ella Core es un núcleo 5G diseñado para redes privadas. Las versiones anteriores a la 1.6.0 entran en pánico al procesar mensajes NGAP con ID de sesión PDU inválidos fuera de 1-15. Un atacante capaz de enviar mensajes NGAP manipulados a Ella Core puede provocar la caída del proceso, causando una interrupción del servicio para todos los suscriptores conectados. No se requiere autenticación. La versión 1.6.0 añadió validaciones de ID de sesión PDU durante el manejo de mensajes NGAP."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-129"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ellanetworks:ella_core:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6.0","matchCriteriaId":"4A60BFD6-666C-4509-BE38-04CBFF557242"}]}]}],"references":[{"url":"https://github.com/ellanetworks/core/security/advisories/GHSA-q669-4gmv-g8mf","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}