CVE-2025-15417: Denial of Service in Open5GS
A vulnerability was identified in Open5GS up to 2.7.6. Affected is the function sgwc_s11_handle_create_session_request of the file src/sgwc/s11-handler.c of the component GTPv2-C F-TEID Handler. Such manipulation leads to denial of service. The attack must be carried out locally. The exploit is publicly available and might be used. The name of the patch is 465273d13ba5d47b274c38c9d1b07f04859178a1. A patch should be applied to remediate this issue.
AI Analysis
Technical Summary
CVE-2025-15417 is a vulnerability in Open5GS, an open-source 5G core network software widely used for implementing 5G core network functions. The vulnerability exists in the sgwc_s11_handle_create_session_request function within the src/sgwc/s11-handler.c file, which handles GTPv2-C (GPRS Tunneling Protocol version 2 - Control plane) F-TEID (Fully Qualified Tunnel Endpoint Identifier) processing during session creation requests. Improper handling or manipulation of this function can lead to a denial of service condition, causing the affected component to crash or become unresponsive. The attack vector requires local access with low privileges, meaning an attacker must have some form of access to the system running Open5GS but does not need elevated privileges or user interaction to exploit the flaw. The vulnerability has a CVSS 4.8 (medium) score under CVSS v4.0, reflecting its moderate impact and limited attack vector. The exploit code has been made publicly available, increasing the risk of exploitation, although no active exploitation has been reported. The patch to remediate this issue is identified by commit 465273d13ba5d47b274c38c9d1b07f04859178a1 and should be applied to all affected versions from 2.7.0 through 2.7.6. This vulnerability affects the availability of the 5G core network functions, potentially disrupting mobile network services dependent on Open5GS.
Potential Impact
The primary impact of CVE-2025-15417 is a denial of service condition affecting the availability of 5G core network components running Open5GS. For European telecom operators and infrastructure providers using Open5GS, exploitation could lead to service disruptions, impacting mobile broadband and critical communications services. This could degrade user experience, cause network outages, and potentially affect emergency communications relying on 5G networks. Although the attack requires local access, insider threats or compromised internal systems could leverage this vulnerability to disrupt network operations. Given the increasing adoption of open-source 5G core solutions in Europe, the vulnerability poses a risk to network reliability and operational continuity. The absence of known active exploitation reduces immediate risk, but the public availability of exploit code necessitates proactive patching to prevent future attacks. Disruptions in 5G services could also have cascading effects on IoT deployments, industrial automation, and other sectors dependent on 5G connectivity in Europe.
Mitigation Recommendations
European organizations using Open5GS should immediately apply the patch identified by commit 465273d13ba5d47b274c38c9d1b07f04859178a1 to all affected versions (2.7.0 through 2.7.6). Network administrators should verify that only trusted personnel have local access to Open5GS systems, implementing strict access controls and monitoring for unauthorized access attempts. Employ network segmentation to isolate Open5GS components from less trusted networks and users, reducing the risk of local exploitation. Regularly audit and monitor logs for anomalous activity related to session creation requests or GTPv2-C traffic. Consider deploying intrusion detection systems (IDS) capable of identifying abnormal GTPv2-C messages or malformed session requests. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. Finally, coordinate with telecom vendors and security teams to stay informed about further updates or advisories related to Open5GS vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-15417: Denial of Service in Open5GS
Description
A vulnerability was identified in Open5GS up to 2.7.6. Affected is the function sgwc_s11_handle_create_session_request of the file src/sgwc/s11-handler.c of the component GTPv2-C F-TEID Handler. Such manipulation leads to denial of service. The attack must be carried out locally. The exploit is publicly available and might be used. The name of the patch is 465273d13ba5d47b274c38c9d1b07f04859178a1. A patch should be applied to remediate this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-15417 is a vulnerability in Open5GS, an open-source 5G core network software widely used for implementing 5G core network functions. The vulnerability exists in the sgwc_s11_handle_create_session_request function within the src/sgwc/s11-handler.c file, which handles GTPv2-C (GPRS Tunneling Protocol version 2 - Control plane) F-TEID (Fully Qualified Tunnel Endpoint Identifier) processing during session creation requests. Improper handling or manipulation of this function can lead to a denial of service condition, causing the affected component to crash or become unresponsive. The attack vector requires local access with low privileges, meaning an attacker must have some form of access to the system running Open5GS but does not need elevated privileges or user interaction to exploit the flaw. The vulnerability has a CVSS 4.8 (medium) score under CVSS v4.0, reflecting its moderate impact and limited attack vector. The exploit code has been made publicly available, increasing the risk of exploitation, although no active exploitation has been reported. The patch to remediate this issue is identified by commit 465273d13ba5d47b274c38c9d1b07f04859178a1 and should be applied to all affected versions from 2.7.0 through 2.7.6. This vulnerability affects the availability of the 5G core network functions, potentially disrupting mobile network services dependent on Open5GS.
Potential Impact
The primary impact of CVE-2025-15417 is a denial of service condition affecting the availability of 5G core network components running Open5GS. For European telecom operators and infrastructure providers using Open5GS, exploitation could lead to service disruptions, impacting mobile broadband and critical communications services. This could degrade user experience, cause network outages, and potentially affect emergency communications relying on 5G networks. Although the attack requires local access, insider threats or compromised internal systems could leverage this vulnerability to disrupt network operations. Given the increasing adoption of open-source 5G core solutions in Europe, the vulnerability poses a risk to network reliability and operational continuity. The absence of known active exploitation reduces immediate risk, but the public availability of exploit code necessitates proactive patching to prevent future attacks. Disruptions in 5G services could also have cascading effects on IoT deployments, industrial automation, and other sectors dependent on 5G connectivity in Europe.
Mitigation Recommendations
European organizations using Open5GS should immediately apply the patch identified by commit 465273d13ba5d47b274c38c9d1b07f04859178a1 to all affected versions (2.7.0 through 2.7.6). Network administrators should verify that only trusted personnel have local access to Open5GS systems, implementing strict access controls and monitoring for unauthorized access attempts. Employ network segmentation to isolate Open5GS components from less trusted networks and users, reducing the risk of local exploitation. Regularly audit and monitor logs for anomalous activity related to session creation requests or GTPv2-C traffic. Consider deploying intrusion detection systems (IDS) capable of identifying abnormal GTPv2-C messages or malformed session requests. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. Finally, coordinate with telecom vendors and security teams to stay informed about further updates or advisories related to Open5GS vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-01T10:50:23.624Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6956ffabdb813ff03e890340
Added to database: 1/1/2026, 11:13:47 PM
Last enriched: 1/9/2026, 10:57:37 AM
Last updated: 2/7/2026, 8:59:03 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.