{"api_version":"1","generated_at":"2026-04-11T08:44:28+00:00","cve":"CVE-2026-33906","urls":{"html":"https://cve.report/CVE-2026-33906","api":"https://cve.report/api/cve/CVE-2026-33906.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-33906","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-33906"},"summary":{"title":"Ella Core has Privilege Escalation via Database Restore by NetworkManager role","description":"Ella Core is a 5G core designed for private networks. Prior to version 1.7.0, the NetworkManager role was granted backup and restore permission. The restore endpoint accepted any valid SQLite file without verifying its contents. A NetworkManager could replace the production database with a tampered copy to escalate to Admin, gaining access to user management, audit logs, debug endpoints, and operator identity configuration that the role was explicitly denied. In version 1.7.0, backup and restore permissions have been removed from the NetworkManager role.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-03-27 21:17:26","updated_at":"2026-03-30 13:26:07"},"problem_types":["CWE-269","CWE-269 CWE-269: Improper Privilege Management"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/ellanetworks/core/releases/tag/v1.7.0","name":"https://github.com/ellanetworks/core/releases/tag/v1.7.0","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/ellanetworks/core/security/advisories/GHSA-87j9-m7x6-hvw2","name":"https://github.com/ellanetworks/core/security/advisories/GHSA-87j9-m7x6-hvw2","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/ellanetworks/core/commit/1e4768288a6519fcb63ec83f851584ecebb8a972","name":"https://github.com/ellanetworks/core/commit/1e4768288a6519fcb63ec83f851584ecebb8a972","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-33906","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33906","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"ellanetworks","product":"core","version":"affected < 1.7.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"33906","cve":"CVE-2026-33906","epss":"0.000370000","percentile":"0.108460000","score_date":"2026-04-06","updated_at":"2026-04-07 00:04:51"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-33906","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-03-31T18:51:14.445855Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-31T18:53:56.905Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"core","vendor":"ellanetworks","versions":[{"status":"affected","version":"< 1.7.0"}]}],"descriptions":[{"lang":"en","value":"Ella Core is a 5G core designed for private networks. Prior to version 1.7.0, the NetworkManager role was granted backup and restore permission. The restore endpoint accepted any valid SQLite file without verifying its contents. A NetworkManager could replace the production database with a tampered copy to escalate to Admin, gaining access to user management, audit logs, debug endpoints, and operator identity configuration that the role was explicitly denied. In version 1.7.0, backup and restore permissions have been removed from the NetworkManager role."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269: Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-27T20:56:35.079Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/ellanetworks/core/security/advisories/GHSA-87j9-m7x6-hvw2","tags":["x_refsource_CONFIRM"],"url":"https://github.com/ellanetworks/core/security/advisories/GHSA-87j9-m7x6-hvw2"},{"name":"https://github.com/ellanetworks/core/commit/1e4768288a6519fcb63ec83f851584ecebb8a972","tags":["x_refsource_MISC"],"url":"https://github.com/ellanetworks/core/commit/1e4768288a6519fcb63ec83f851584ecebb8a972"},{"name":"https://github.com/ellanetworks/core/releases/tag/v1.7.0","tags":["x_refsource_MISC"],"url":"https://github.com/ellanetworks/core/releases/tag/v1.7.0"}],"source":{"advisory":"GHSA-87j9-m7x6-hvw2","discovery":"UNKNOWN"},"title":"Ella Core has Privilege Escalation via Database Restore by NetworkManager role"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-33906","datePublished":"2026-03-27T20:56:35.079Z","dateReserved":"2026-03-24T15:41:47.491Z","dateUpdated":"2026-03-31T18:53:56.905Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-27 21:17:26","lastModifiedDate":"2026-03-30 13:26:07","problem_types":["CWE-269","CWE-269 CWE-269: Improper Privilege Management"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"33906","Ordinal":"1","Title":"Ella Core has Privilege Escalation via Database Restore by Netwo","CVE":"CVE-2026-33906","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"33906","Ordinal":"1","NoteData":"Ella Core is a 5G core designed for private networks. Prior to version 1.7.0, the NetworkManager role was granted backup and restore permission. The restore endpoint accepted any valid SQLite file without verifying its contents. A NetworkManager could replace the production database with a tampered copy to escalate to Admin, gaining access to user management, audit logs, debug endpoints, and operator identity configuration that the role was explicitly denied. In version 1.7.0, backup and restore permissions have been removed from the NetworkManager role.","Type":"Description","Title":"Ella Core has Privilege Escalation via Database Restore by Netwo"}]}}}