CVE-2025-14954: Reachable Assertion in Open5GS
A vulnerability has been found in Open5GS up to 2.7.6. Affected is the function ogs_pfcp_pdr_find_or_add/ogs_pfcp_far_find_or_add/ogs_pfcp_urr_find_or_add/ogs_pfcp_qer_find_or_add in the library lib/pfcp/context.c of the component QER/FAR/URR/PDR. The manipulation leads to reachable assertion. It is possible to initiate the attack remotely. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 442369dcd964f03d95429a6a01a57ed21f7779b7. Applying a patch is the recommended action to fix this issue.
AI Analysis
Technical Summary
CVE-2025-14954 is a vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw resides in the PFCP (Packet Forwarding Control Protocol) context management within the functions ogs_pfcp_pdr_find_or_add, ogs_pfcp_far_find_or_add, ogs_pfcp_urr_find_or_add, and ogs_pfcp_qer_find_or_add located in lib/pfcp/context.c. These functions handle the creation or retrieval of PFCP entities such as PDR (Packet Detection Rules), FAR (Forwarding Action Rules), URR (Usage Reporting Rules), and QER (QoS Enforcement Rules). The vulnerability manifests as a reachable assertion failure, which can be triggered remotely by sending crafted PFCP messages. This assertion failure can cause the Open5GS process to terminate unexpectedly, leading to a denial of service condition. The attack complexity is rated high, indicating that exploitation requires significant skill or specific conditions, and no authentication or user interaction is needed. The vulnerability affects Open5GS versions 2.7.0 through 2.7.6. Although the exploitability is difficult, the vulnerability has been publicly disclosed, increasing the risk of future exploitation. The patch identified by commit 442369dcd964f03d95429a6a01a57ed21f7779b7 addresses this issue by correcting the assertion logic and improving input validation in the affected functions. The CVSS 4.0 base score is 6.3 (medium severity), reflecting a network attack vector with high complexity but no privileges or user interaction required, and limited impact confined to availability degradation. No known exploits are currently active in the wild, but the public disclosure necessitates prompt remediation.
Potential Impact
For European organizations, especially telecom operators and infrastructure providers deploying Open5GS as part of their 5G core network, this vulnerability poses a risk of service disruption due to denial of service attacks. An attacker could remotely cause the Open5GS core components to crash by exploiting the reachable assertion, potentially interrupting mobile network services such as data forwarding, QoS enforcement, and usage reporting. This could degrade network availability, impacting end-users and enterprise customers relying on 5G connectivity. Given the critical role of 5G networks in supporting digital services, IoT, and critical communications, even temporary outages can have significant operational and reputational consequences. The high attack complexity and lack of known exploits reduce immediate risk, but the public disclosure increases the likelihood of future attempts. Organizations operating Open5GS in Europe must consider this vulnerability in their risk assessments, particularly those in countries with advanced 5G rollouts and high reliance on open-source core network components.
Mitigation Recommendations
1. Apply the official patch corresponding to commit 442369dcd964f03d95429a6a01a57ed21f7779b7 immediately to all affected Open5GS instances. 2. Conduct thorough testing in staging environments before deployment to ensure stability and compatibility. 3. Implement strict network segmentation and firewall rules to restrict PFCP traffic to trusted network segments and known peers only, minimizing exposure to untrusted sources. 4. Deploy continuous monitoring and anomaly detection for PFCP protocol traffic to identify unusual patterns or malformed messages that could indicate exploitation attempts. 5. Maintain up-to-date inventories of Open5GS deployments and versions to prioritize patching efforts. 6. Engage with Open5GS community and vendors for ongoing security updates and best practices. 7. Consider fallback or redundancy mechanisms in the 5G core network architecture to mitigate potential service disruptions. 8. Train network operations teams on the specifics of this vulnerability and response procedures in case of incidents.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland
CVE-2025-14954: Reachable Assertion in Open5GS
Description
A vulnerability has been found in Open5GS up to 2.7.6. Affected is the function ogs_pfcp_pdr_find_or_add/ogs_pfcp_far_find_or_add/ogs_pfcp_urr_find_or_add/ogs_pfcp_qer_find_or_add in the library lib/pfcp/context.c of the component QER/FAR/URR/PDR. The manipulation leads to reachable assertion. It is possible to initiate the attack remotely. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 442369dcd964f03d95429a6a01a57ed21f7779b7. Applying a patch is the recommended action to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-14954 is a vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw resides in the PFCP (Packet Forwarding Control Protocol) context management within the functions ogs_pfcp_pdr_find_or_add, ogs_pfcp_far_find_or_add, ogs_pfcp_urr_find_or_add, and ogs_pfcp_qer_find_or_add located in lib/pfcp/context.c. These functions handle the creation or retrieval of PFCP entities such as PDR (Packet Detection Rules), FAR (Forwarding Action Rules), URR (Usage Reporting Rules), and QER (QoS Enforcement Rules). The vulnerability manifests as a reachable assertion failure, which can be triggered remotely by sending crafted PFCP messages. This assertion failure can cause the Open5GS process to terminate unexpectedly, leading to a denial of service condition. The attack complexity is rated high, indicating that exploitation requires significant skill or specific conditions, and no authentication or user interaction is needed. The vulnerability affects Open5GS versions 2.7.0 through 2.7.6. Although the exploitability is difficult, the vulnerability has been publicly disclosed, increasing the risk of future exploitation. The patch identified by commit 442369dcd964f03d95429a6a01a57ed21f7779b7 addresses this issue by correcting the assertion logic and improving input validation in the affected functions. The CVSS 4.0 base score is 6.3 (medium severity), reflecting a network attack vector with high complexity but no privileges or user interaction required, and limited impact confined to availability degradation. No known exploits are currently active in the wild, but the public disclosure necessitates prompt remediation.
Potential Impact
For European organizations, especially telecom operators and infrastructure providers deploying Open5GS as part of their 5G core network, this vulnerability poses a risk of service disruption due to denial of service attacks. An attacker could remotely cause the Open5GS core components to crash by exploiting the reachable assertion, potentially interrupting mobile network services such as data forwarding, QoS enforcement, and usage reporting. This could degrade network availability, impacting end-users and enterprise customers relying on 5G connectivity. Given the critical role of 5G networks in supporting digital services, IoT, and critical communications, even temporary outages can have significant operational and reputational consequences. The high attack complexity and lack of known exploits reduce immediate risk, but the public disclosure increases the likelihood of future attempts. Organizations operating Open5GS in Europe must consider this vulnerability in their risk assessments, particularly those in countries with advanced 5G rollouts and high reliance on open-source core network components.
Mitigation Recommendations
1. Apply the official patch corresponding to commit 442369dcd964f03d95429a6a01a57ed21f7779b7 immediately to all affected Open5GS instances. 2. Conduct thorough testing in staging environments before deployment to ensure stability and compatibility. 3. Implement strict network segmentation and firewall rules to restrict PFCP traffic to trusted network segments and known peers only, minimizing exposure to untrusted sources. 4. Deploy continuous monitoring and anomaly detection for PFCP protocol traffic to identify unusual patterns or malformed messages that could indicate exploitation attempts. 5. Maintain up-to-date inventories of Open5GS deployments and versions to prioritize patching efforts. 6. Engage with Open5GS community and vendors for ongoing security updates and best practices. 7. Consider fallback or redundancy mechanisms in the 5G core network architecture to mitigate potential service disruptions. 8. Train network operations teams on the specifics of this vulnerability and response procedures in case of incidents.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T08:31:35.484Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694579a3133fda1465c274d1
Added to database: 12/19/2025, 4:13:23 PM
Last enriched: 1/3/2026, 12:12:01 AM
Last updated: 2/7/2026, 2:06:04 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.