OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-amf/-/issues/78 |
|
History
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenAirInterface 2.2.0 Security Mode Complete Accepts IA0 Leading to Replay Attack | |
| Weaknesses | CWE-290 CWE-322 |
Wed, 08 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-08T16:04:37.407Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30080
No data.
Status : Awaiting Analysis
Published: 2026-04-08T17:21:18.623
Modified: 2026-04-08T21:26:13.410
Link: CVE-2026-30080
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:44:45Z