Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-33903

CVE-2026-33903: Ella Core 5G NGAP DoS Vulnerability

CVE-2026-33903 is a denial of service vulnerability in Ella Core 5G that allows attackers to crash the process using crafted NGAP messages. This article covers technical details, affected versions, and mitigation strategies.

Published: April 2, 2026

CVE-2026-33903 Overview

CVE-2026-33903 is a Null Pointer Dereference vulnerability affecting Ella Core, a 5G core designed for private networks. Versions prior to 1.7.0 panic when processing a specially crafted NGAP LocationReport message due to missing null checks on Information Elements (IEs). An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers.

Critical Impact

Successful exploitation results in complete denial of service for all 5G subscribers connected to the affected Ella Core instance, potentially disrupting critical private network communications.

Affected Products

  • Ella Core versions prior to 1.7.0
  • 5G private network deployments using vulnerable Ella Core versions
  • NGAP (NG Application Protocol) handlers in AMF (Access and Mobility Management Function)

Discovery Timeline

  • 2026-03-27 - CVE-2026-33903 published to NVD
  • 2026-03-30 - Last updated in NVD database

Technical Details for CVE-2026-33903

Vulnerability Analysis

This vulnerability stems from improper input validation in the NGAP Location Report handler within Ella Core's AMF implementation. The affected code fails to verify whether the AreaOfInterestList Information Element is present before attempting to iterate over its contents. When a malformed NGAP LocationReport message is received without the expected IEs, the handler attempts to access a nil pointer, causing the Go runtime to panic and crash the entire process.

The vulnerability is classified as CWE-476 (NULL Pointer Dereference). The attack requires adjacent network access, meaning an attacker must be able to reach the NGAP interface, which is typically exposed on the N2 interface between the gNB (5G base station) and the AMF. While this limits the attack surface compared to internet-facing vulnerabilities, compromised or malicious radio equipment within the network perimeter could readily exploit this flaw.

Root Cause

The root cause is the absence of null pointer guards before dereferencing the locationReportingRequestType.AreaOfInterestList field and related UE association data structures. The NGAP protocol allows optional Information Elements, but the handler implementation assumed these fields would always be populated when processing LocationReport messages.

A secondary issue exists in the NG Reset handler where improper control flow allows code execution to continue after encountering a nil ranUe reference, potentially leading to additional dereference issues.

Attack Vector

The attack vector requires adjacent network access to the NGAP interface. An attacker with access to the N2 interface (typically between the gNB and AMF) can craft malicious NGAP LocationReport messages that omit required Information Elements. When the AMF processes these malformed messages, the null pointer dereference triggers a panic, terminating the Ella Core process and disconnecting all subscribers.

go
// Security patch - Added null check for AreaOfInterestList
// Source: https://github.com/ellanetworks/core/commit/ec77a2ad4508f8488cb356fd45b2f1efd92587f8

 			break
 		}
 
+		if locationReportingRequestType.AreaOfInterestList == nil {
+			logger.WithTrace(ctx, ranUe.Log).Warn("AreaOfInterestList is nil, skipping area matching")
+			break
+		}
+
 		for _, uEPresenceInAreaOfInterestItem := range uEPresenceInAreaOfInterestList.List {
 			uEPresence := uEPresenceInAreaOfInterestItem.UEPresence.Value
 			referenceID := uEPresenceInAreaOfInterestItem.LocationReportingReferenceID.Value

Source: GitHub Commit Update

go
// Security patch - Fixed control flow in NG Reset handler
// Source: https://github.com/ellanetworks/core/commit/ec77a2ad4508f8488cb356fd45b2f1efd92587f8

 				if ueAssociatedLogicalNGConnectionItem.RANUENGAPID != nil {
 					logger.WithTrace(ctx, ran.Log).Warn("RANUENGAPID is not empty", zap.Int64("RanUeNgapID", ueAssociatedLogicalNGConnectionItem.RANUENGAPID.Value))
 				}
+
+				continue
 			}
 
 			err := ranUe.Remove()

Source: GitHub Commit Update

Detection Methods for CVE-2026-33903

Indicators of Compromise

  • Unexpected Ella Core process terminations or restarts in system logs
  • Go runtime panic messages referencing handle_location_report.go or handle_ng_reset.go in crash dumps
  • Sudden mass disconnection of 5G subscribers without network infrastructure issues
  • NGAP LocationReport messages with missing or malformed Information Elements in packet captures

Detection Strategies

  • Monitor Ella Core process health and implement alerting on unexpected process terminations
  • Deploy network intrusion detection rules to identify malformed NGAP messages targeting the AMF
  • Analyze NGAP traffic for LocationReport messages with anomalous or missing IE structures
  • Implement log correlation to detect patterns of repeated crashes coinciding with specific NGAP message types

Monitoring Recommendations

  • Enable verbose logging on the NGAP handler to capture details of incoming messages before processing
  • Set up process monitoring with automatic restart capabilities to minimize downtime during attacks
  • Monitor N2 interface traffic for unusual patterns or sources of NGAP messages
  • Implement rate limiting on NGAP message processing to slow potential denial of service attacks

How to Mitigate CVE-2026-33903

Immediate Actions Required

  • Upgrade Ella Core to version 1.7.0 or later immediately
  • Review and restrict network access to the N2/NGAP interface to trusted gNB equipment only
  • Implement network segmentation to isolate the AMF from untrusted network segments
  • Enable process supervision to automatically restart Ella Core in case of crashes

Patch Information

Ella Networks has released version 1.7.0 which adds guards in the NGAP Location Report handler to prevent null pointer dereferences. The patch adds explicit nil checks before accessing optional Information Elements and corrects control flow issues in the NG Reset handler. Organizations should upgrade to this version through their standard deployment process.

For detailed patch information, refer to the GitHub Security Advisory GHSA-f2f3-9cx3-wcmf and the GitHub Release v1.7.0.

Workarounds

  • Implement firewall rules to restrict NGAP traffic to known, trusted gNB IP addresses only
  • Deploy a network-level proxy or filter that validates NGAP message structure before forwarding to Ella Core
  • Enable process monitoring and automatic restart to reduce downtime if exploitation occurs
  • Consider deploying redundant AMF instances to maintain service availability during potential attacks
bash
# Configuration example - Restrict NGAP interface access
# Allow only trusted gNB addresses to reach the AMF NGAP port

# Example iptables rules to restrict N2 interface access
iptables -A INPUT -p sctp --dport 38412 -s 10.0.1.0/24 -j ACCEPT
iptables -A INPUT -p sctp --dport 38412 -j DROP

# Enable process monitoring with systemd
systemctl enable ella-core
systemctl edit ella-core --force
# Add: Restart=always and RestartSec=5

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechElla Core

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Technical References
  • GitHub Commit Update

  • GitHub Release v1.7.0

  • GitHub Security Advisory GHSA-f2f3-9cx3-wcmf
  • Related CVEs
  • CVE-2026-34761: Ella Core DoS Vulnerability

  • CVE-2026-33904: Ella Core 5G AMF Deadlock DoS Vulnerability

  • CVE-2026-33907: Ella Core 5G DoS Vulnerability

  • CVE-2026-34762: Ella Core Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English