CVE-2025-14954: Reachable Assertion in Open5GS
A vulnerability has been found in Open5GS up to 2.7.5. Affected is the function ogs_pfcp_pdr_find_or_add/ogs_pfcp_far_find_or_add/ogs_pfcp_urr_find_or_add/ogs_pfcp_qer_find_or_add in the library lib/pfcp/context.c of the component QER/FAR/URR/PDR. The manipulation leads to reachable assertion. It is possible to initiate the attack remotely. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 442369dcd964f03d95429a6a01a57ed21f7779b7. Applying a patch is the recommended action to fix this issue.
AI Analysis
Technical Summary
CVE-2025-14954 is a vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw exists in the PFCP (Packet Forwarding Control Protocol) context management functions: ogs_pfcp_pdr_find_or_add, ogs_pfcp_far_find_or_add, ogs_pfcp_urr_find_or_add, and ogs_pfcp_qer_find_or_add within the lib/pfcp/context.c source file. These functions handle the creation or retrieval of PDR (Packet Detection Rule), FAR (Forwarding Action Rule), URR (Usage Reporting Rule), and QER (QoS Enforcement Rule) entities, which are critical for managing user plane traffic in 5G networks. The vulnerability manifests as a reachable assertion failure triggered by crafted PFCP messages that manipulate these components, leading to an unexpected program state and likely causing a denial of service (DoS) by crashing or halting the affected process. The attack can be initiated remotely without authentication or user interaction, but the complexity is rated high due to the need for precise manipulation of PFCP messages. The CVSS 4.0 score is 6.3 (medium severity), reflecting the moderate impact on availability and the difficulty of exploitation. No known exploits have been observed in the wild, but the vulnerability has been publicly disclosed, and a patch identified by commit 442369dcd964f03d95429a6a01a57ed21f7779b7 is available to remediate the issue. This vulnerability primarily threatens the availability of 5G core network functions relying on Open5GS, potentially disrupting mobile service continuity.
Potential Impact
For European organizations, particularly telecom operators and mobile service providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a risk of service disruption through denial of service attacks. The PFCP protocol is essential for user plane traffic management; thus, exploitation could interrupt data forwarding and degrade network performance or availability. This could impact end-users by causing dropped connections or degraded quality of service. Given the critical role of 5G networks in supporting essential services, IoT, and enterprise connectivity, even temporary outages could have significant operational and reputational consequences. Additionally, regulatory compliance frameworks in Europe emphasize network reliability and security, so failure to address this vulnerability could lead to compliance issues. While confidentiality and integrity impacts are minimal, the availability impact is significant enough to warrant urgent attention. The high complexity of exploitation somewhat reduces immediate risk but does not eliminate it, especially as attackers may develop more sophisticated methods over time.
Mitigation Recommendations
The primary mitigation is to apply the official patch identified by commit 442369dcd964f03d95429a6a01a57ed21f7779b7 to all affected Open5GS versions (2.7.0 through 2.7.5). Network operators should ensure timely updates of their 5G core network components. Additionally, implementing strict PFCP message validation and anomaly detection can help identify and block malformed or suspicious PFCP traffic attempting to exploit this vulnerability. Deploying network segmentation and limiting exposure of PFCP interfaces to trusted network segments reduces the attack surface. Monitoring logs and network telemetry for unusual PFCP activity or assertion failures can provide early warning signs. Operators should also review their incident response plans to handle potential denial of service events affecting 5G core functions. Finally, engaging with Open5GS community updates and security advisories will help maintain awareness of emerging threats and patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-14954: Reachable Assertion in Open5GS
Description
A vulnerability has been found in Open5GS up to 2.7.5. Affected is the function ogs_pfcp_pdr_find_or_add/ogs_pfcp_far_find_or_add/ogs_pfcp_urr_find_or_add/ogs_pfcp_qer_find_or_add in the library lib/pfcp/context.c of the component QER/FAR/URR/PDR. The manipulation leads to reachable assertion. It is possible to initiate the attack remotely. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 442369dcd964f03d95429a6a01a57ed21f7779b7. Applying a patch is the recommended action to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-14954 is a vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw exists in the PFCP (Packet Forwarding Control Protocol) context management functions: ogs_pfcp_pdr_find_or_add, ogs_pfcp_far_find_or_add, ogs_pfcp_urr_find_or_add, and ogs_pfcp_qer_find_or_add within the lib/pfcp/context.c source file. These functions handle the creation or retrieval of PDR (Packet Detection Rule), FAR (Forwarding Action Rule), URR (Usage Reporting Rule), and QER (QoS Enforcement Rule) entities, which are critical for managing user plane traffic in 5G networks. The vulnerability manifests as a reachable assertion failure triggered by crafted PFCP messages that manipulate these components, leading to an unexpected program state and likely causing a denial of service (DoS) by crashing or halting the affected process. The attack can be initiated remotely without authentication or user interaction, but the complexity is rated high due to the need for precise manipulation of PFCP messages. The CVSS 4.0 score is 6.3 (medium severity), reflecting the moderate impact on availability and the difficulty of exploitation. No known exploits have been observed in the wild, but the vulnerability has been publicly disclosed, and a patch identified by commit 442369dcd964f03d95429a6a01a57ed21f7779b7 is available to remediate the issue. This vulnerability primarily threatens the availability of 5G core network functions relying on Open5GS, potentially disrupting mobile service continuity.
Potential Impact
For European organizations, particularly telecom operators and mobile service providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a risk of service disruption through denial of service attacks. The PFCP protocol is essential for user plane traffic management; thus, exploitation could interrupt data forwarding and degrade network performance or availability. This could impact end-users by causing dropped connections or degraded quality of service. Given the critical role of 5G networks in supporting essential services, IoT, and enterprise connectivity, even temporary outages could have significant operational and reputational consequences. Additionally, regulatory compliance frameworks in Europe emphasize network reliability and security, so failure to address this vulnerability could lead to compliance issues. While confidentiality and integrity impacts are minimal, the availability impact is significant enough to warrant urgent attention. The high complexity of exploitation somewhat reduces immediate risk but does not eliminate it, especially as attackers may develop more sophisticated methods over time.
Mitigation Recommendations
The primary mitigation is to apply the official patch identified by commit 442369dcd964f03d95429a6a01a57ed21f7779b7 to all affected Open5GS versions (2.7.0 through 2.7.5). Network operators should ensure timely updates of their 5G core network components. Additionally, implementing strict PFCP message validation and anomaly detection can help identify and block malformed or suspicious PFCP traffic attempting to exploit this vulnerability. Deploying network segmentation and limiting exposure of PFCP interfaces to trusted network segments reduces the attack surface. Monitoring logs and network telemetry for unusual PFCP activity or assertion failures can provide early warning signs. Operators should also review their incident response plans to handle potential denial of service events affecting 5G core functions. Finally, engaging with Open5GS community updates and security advisories will help maintain awareness of emerging threats and patches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T08:31:35.484Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694579a3133fda1465c274d1
Added to database: 12/19/2025, 4:13:23 PM
Last enriched: 12/19/2025, 4:28:26 PM
Last updated: 12/19/2025, 5:16:06 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63665: n/a
UnknownCVE-2025-14957: NULL Pointer Dereference in WebAssembly Binaryen
MediumCVE-2025-68477: CWE-918: Server-Side Request Forgery (SSRF) in langflow-ai langflow
HighCVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime
LowCVE-2025-14809: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in The Browser Company of New York ArcSearch
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.