Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14955: Improper Initialization in Open5GS

0
Medium
VulnerabilityCVE-2025-14955cvecve-2025-14955
Published: Fri Dec 19 2025 (12/19/2025, 16:32:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was found in Open5GS up to 2.7.5. Affected by this vulnerability is the function ogs_pfcp_handle_create_pdr in the library lib/pfcp/handler.c of the component PFCP. The manipulation results in improper initialization. It is possible to launch the attack remotely. This attack is characterized by high complexity. The exploitation appears to be difficult. The exploit has been made public and could be used. The patch is identified as 773117aa5472af26fc9f80e608d3386504c3bdb7. It is best practice to apply a patch to resolve this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:07:03 UTC

Technical Analysis

CVE-2025-14955 identifies a vulnerability in Open5GS, an open-source 5G core network software, specifically affecting versions 2.7.0 through 2.7.5. The issue resides in the function ogs_pfcp_handle_create_pdr within the PFCP (Packet Forwarding Control Protocol) component, implemented in lib/pfcp/handler.c. The vulnerability stems from improper initialization during the handling of PFCP Create PDR (Packet Detection Rule) messages. Improper initialization can lead to unpredictable behavior or memory corruption, potentially allowing an attacker to disrupt the normal operation of the PFCP component. The vulnerability can be triggered remotely without requiring authentication or user interaction, increasing the attack surface. However, the attack complexity is high, indicating that exploitation requires significant expertise or specific conditions. The CVSS v4.0 base score is 6.3, reflecting a medium severity level. The impact vector indicates no compromise of confidentiality, integrity, or availability beyond limited impact on integrity (VA:L). The vulnerability does not affect confidentiality or availability and does not require privileges or user interaction. The patch identified by commit 773117aa5472af26fc9f80e608d3386504c3bdb7 addresses the improper initialization issue. No known exploits are currently active in the wild, but the exploit code has been publicly disclosed, increasing the risk of future exploitation. Open5GS is widely used by telecom operators, research institutions, and enterprises deploying private 5G networks, making this vulnerability relevant to the telecommunications sector.

Potential Impact

The primary impact of CVE-2025-14955 is on the integrity of the PFCP component within Open5GS, which is critical for managing packet forwarding rules in 5G core networks. Successful exploitation could cause unexpected behavior or partial disruption of PFCP message processing, potentially leading to degraded network performance or denial of service in packet forwarding functions. While the vulnerability does not directly compromise confidentiality or availability, any disruption in PFCP processing can affect the reliability and stability of 5G network services. Telecom operators and service providers relying on Open5GS for their 5G core infrastructure may experience service degradation or interruptions, impacting end-user connectivity and service quality. Given the high complexity of exploitation, widespread attacks are less likely but targeted attacks against specific networks remain a concern. The public availability of exploit code increases the urgency for patching to prevent attackers from developing reliable exploits. Organizations operating private or public 5G networks with Open5GS deployments are at risk, especially those unable to promptly apply security updates.

Mitigation Recommendations

To mitigate CVE-2025-14955, organizations should immediately apply the official patch identified by commit 773117aa5472af26fc9f80e608d3386504c3bdb7 to all affected Open5GS instances. Network operators should verify their Open5GS version and upgrade to a fixed version beyond 2.7.5. In addition to patching, it is recommended to implement strict network segmentation and firewall rules to restrict access to PFCP interfaces, limiting exposure to untrusted networks. Monitoring and logging of PFCP traffic should be enhanced to detect anomalous or malformed Create PDR messages that could indicate exploitation attempts. Employing intrusion detection systems (IDS) with signatures for known exploit patterns can provide early warning. Regular security audits and vulnerability assessments of 5G core components should be conducted to identify and remediate similar issues proactively. Finally, maintaining an up-to-date inventory of Open5GS deployments and ensuring rapid patch management processes are critical to minimizing exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-19T08:31:39.061Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69458084f063e4fadff5e830

Added to database: 12/19/2025, 4:42:44 PM

Last enriched: 2/24/2026, 11:07:03 PM

Last updated: 3/25/2026, 4:55:07 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses