{"api_version":"1","generated_at":"2026-04-08T19:54:49+00:00","cve":"CVE-2026-30080","urls":{"html":"https://cve.report/CVE-2026-30080","api":"https://cve.report/api/cve/CVE-2026-30080.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-30080","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-30080"},"summary":{"title":"CVE-2026-30080","description":"OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack.","state":"PUBLISHED","assigner":"mitre","published_at":"2026-04-08 17:21:18","updated_at":"2026-04-08 17:21:18"},"problem_types":["n/a"],"metrics":[],"references":[{"url":"https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-amf/-/issues/78","name":"https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-amf/-/issues/78","refsource":"cve@mitre.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-30080","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-30080","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T16:04:37.407Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"url":"https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-amf/-/issues/78"}]}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2026-30080","datePublished":"2026-04-08T00:00:00.000Z","dateReserved":"2026-03-04T00:00:00.000Z","dateUpdated":"2026-04-08T16:04:37.407Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-08 17:21:18","lastModifiedDate":"2026-04-08 17:21:18","problem_types":["n/a"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"30080","Ordinal":"1","Title":"CVE-2026-30080","CVE":"CVE-2026-30080","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"30080","Ordinal":"1","NoteData":"OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack.","Type":"Description","Title":"CVE-2026-30080"}]}}}