CVE-2026-34762 Overview
CVE-2026-34762 is an Improper Input Validation vulnerability in Ella Core, a 5G core solution designed for private networks. Prior to version 1.8.0, the PUT /api/v1/subscriber/{imsi} API endpoint accepts an IMSI (International Mobile Subscriber Identity) identifier from both the URL path and the JSON request body but fails to verify that these values match. This design flaw allows an authenticated NetworkManager to modify any subscriber's policy while the audit trail records a fabricated or unrelated subscriber IMSI, effectively bypassing audit controls.
Critical Impact
Authenticated attackers with NetworkManager privileges can manipulate subscriber policies without proper audit attribution, enabling unauthorized policy modifications with audit trail evasion.
Affected Products
- Ella Core versions prior to 1.8.0
- Private 5G network deployments using vulnerable Ella Core installations
- Subscriber management API endpoints in affected versions
Discovery Timeline
- 2026-04-02 - CVE-2026-34762 published to NVD
- 2026-04-02 - Last updated in NVD database
Technical Details for CVE-2026-34762
Vulnerability Analysis
This vulnerability represents a classic parameter binding inconsistency issue where the application accepts the same logical parameter from multiple input sources without proper validation. The PUT /api/v1/subscriber/{imsi} endpoint is designed to update subscriber policies based on the IMSI identifier. However, the implementation accepts the IMSI value from both the URL path parameter and the JSON request body independently.
The core issue lies in the lack of server-side validation to ensure these two IMSI values are identical before processing the request. When a legitimate NetworkManager submits a request, they can specify one IMSI in the URL (which gets logged for audit purposes) while including a different IMSI in the request body (which is used for the actual database operation). This creates a dangerous disconnect between what is audited and what actually occurs.
The vulnerability has been classified under CWE-20 (Improper Input Validation), as the root cause stems from insufficient validation of input parameters before use.
Root Cause
The root cause is the failure to implement a consistency check between the IMSI parameter in the URL path and the IMSI field in the JSON request body. The application processes the request body IMSI for database operations while logging the URL path IMSI for audit purposes, without ever comparing the two values. This architectural oversight allows the attacker to control both the target of the modification (via request body) and the audit record (via URL path) independently.
Attack Vector
The attack requires authenticated access with NetworkManager privileges. An attacker would craft a malicious HTTP PUT request where the URL contains one subscriber's IMSI (which will be recorded in audit logs) while the JSON body contains a different subscriber's IMSI (whose policy will actually be modified).
For example, an attacker could send a request to modify subscriber A's policy (using A's IMSI in the URL for audit logging) while the request body targets subscriber B's record for actual modification. The audit trail would show an authorized change to subscriber A, while subscriber B's policy is silently altered.
This attack enables policy manipulation with audit trail obfuscation, making it difficult for security teams to trace unauthorized changes back to their actual targets.
Detection Methods for CVE-2026-34762
Indicators of Compromise
- Discrepancies between audit log entries and actual subscriber policy changes in the database
- Unusual patterns of subscriber policy modifications by NetworkManager accounts
- HTTP PUT requests to /api/v1/subscriber/{imsi} endpoints where forensic analysis reveals mismatched IMSI values
Detection Strategies
- Implement log correlation between API audit trails and database transaction logs to identify IMSI mismatches
- Deploy API gateway rules to inspect and compare IMSI values in both URL paths and request bodies
- Enable detailed request logging that captures both URL parameters and full request body content for subscriber modification endpoints
Monitoring Recommendations
- Monitor for unusual subscriber policy modification patterns, especially high-volume changes from single NetworkManager accounts
- Implement alerting for any detected discrepancies between audit-logged IMSI values and actual database modifications
- Review NetworkManager activity logs regularly for signs of policy manipulation targeting multiple unrelated subscribers
How to Mitigate CVE-2026-34762
Immediate Actions Required
- Upgrade Ella Core to version 1.8.0 or later immediately
- Audit existing subscriber policy records for unauthorized modifications
- Review NetworkManager account activity logs for suspicious patterns prior to patching
- Implement additional API gateway validation as a defense-in-depth measure
Patch Information
The vulnerability has been patched in Ella Core version 1.8.0. Organizations should upgrade to this version or later to remediate the issue. The patch implements proper validation to ensure the IMSI in the URL path matches the IMSI in the request body before processing any subscriber policy modifications.
For detailed information about the security fix, refer to the GitHub Security Advisory GHSA-xw45-cc32-442f and the GitHub Release v1.8.0.
Workarounds
- Implement API gateway validation rules to compare IMSI values in URL paths against request body content and reject mismatched requests
- Enable enhanced audit logging that captures complete request details including both URL parameters and request body content
- Restrict NetworkManager account privileges to the minimum necessary and implement additional approval workflows for subscriber policy changes
- Deploy network segmentation to limit access to the subscriber management API
# Example API gateway rule concept for NGINX/similar proxies
# Validate IMSI consistency before forwarding to backend
# Note: Actual implementation varies by gateway product
# Recommended: Upgrade to Ella Core v1.8.0 for proper fix
# Download: https://github.com/ellanetworks/core/releases/tag/v1.8.0
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

