CVE-2025-15528: Denial of Service in Open5GS
CVE-2025-15528 is a medium-severity denial of service (DoS) vulnerability in Open5GS versions up to 2. 7. 6, specifically in the GTPv2 Bearer Response Handler component. The flaw allows a remote attacker to cause service disruption without requiring authentication or user interaction. Exploitation involves sending manipulated GTPv2 messages, leading to a denial of service condition. Although no known exploits are currently observed in the wild, the vulnerability has been publicly disclosed along with a patch. European organizations using Open5GS for 5G core network functions could face service outages impacting telecom infrastructure. Mitigation requires applying the vendor patch identified by commit 98f76e98df35cd6a35e868aa62715db7f8141ac1 promptly. Countries with significant 5G deployments and Open5GS adoption, such as Germany, France, and the UK, are most at risk. The vulnerability’s medium severity reflects its remote exploitability and impact on availability but limited scope and no privilege escalation.
AI Analysis
Technical Summary
CVE-2025-15528 is a vulnerability affecting Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw resides in the GTPv2 Bearer Response Handler, a critical component responsible for managing bearer context responses in the GPRS Tunneling Protocol version 2 (GTPv2), which is essential for session management in 5G networks. The vulnerability allows an unauthenticated remote attacker to send specially crafted GTPv2 messages that manipulate the Bearer Response Handler, causing the Open5GS service to crash or become unresponsive, resulting in a denial of service condition. This disrupts the availability of 5G core network functions, potentially impacting subscriber connectivity and network reliability. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, and a direct impact on availability. The vulnerability has been publicly disclosed, and a patch is available identified by the commit hash 98f76e98df35cd6a35e868aa62715db7f8141ac1. No known exploits have been observed in the wild yet, but the public disclosure increases the risk of exploitation attempts. Open5GS is used by telecom operators and enterprises deploying private 5G networks, making this vulnerability relevant to critical communication infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-15528 can be significant, especially for telecom operators and enterprises relying on Open5GS for 5G core network functions. A successful denial of service attack could lead to temporary loss of connectivity for subscribers, disruption of critical communication services, and degradation of network performance. This could affect emergency services, industrial automation, and other sectors dependent on reliable 5G connectivity. The disruption may also cause reputational damage and financial losses due to service outages. Since the vulnerability is remotely exploitable without authentication, attackers can launch DoS attacks from outside the network perimeter, increasing the threat surface. Although no data confidentiality or integrity impact is indicated, the availability impact alone can have cascading effects on dependent services and applications. European telecom regulators may also impose compliance and reporting obligations in case of service disruptions caused by this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-15528, organizations should promptly apply the official patch released by the Open5GS project, identified by commit 98f76e98df35cd6a35e868aa62715db7f8141ac1. Network operators should verify that their Open5GS deployments are upgraded beyond version 2.7.6 or have the patch backported. Additionally, monitoring GTPv2 traffic for unusual or malformed bearer response messages can help detect exploitation attempts early. Implementing rate limiting and anomaly detection on GTPv2 interfaces can reduce the risk of DoS attacks. Network segmentation and firewall rules restricting GTPv2 traffic to trusted sources can further limit exposure. Operators should also maintain robust incident response plans to quickly restore services in case of an attack. Regular vulnerability scanning and penetration testing of 5G core components are recommended to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2025-15528: Denial of Service in Open5GS
Description
CVE-2025-15528 is a medium-severity denial of service (DoS) vulnerability in Open5GS versions up to 2. 7. 6, specifically in the GTPv2 Bearer Response Handler component. The flaw allows a remote attacker to cause service disruption without requiring authentication or user interaction. Exploitation involves sending manipulated GTPv2 messages, leading to a denial of service condition. Although no known exploits are currently observed in the wild, the vulnerability has been publicly disclosed along with a patch. European organizations using Open5GS for 5G core network functions could face service outages impacting telecom infrastructure. Mitigation requires applying the vendor patch identified by commit 98f76e98df35cd6a35e868aa62715db7f8141ac1 promptly. Countries with significant 5G deployments and Open5GS adoption, such as Germany, France, and the UK, are most at risk. The vulnerability’s medium severity reflects its remote exploitability and impact on availability but limited scope and no privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2025-15528 is a vulnerability affecting Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw resides in the GTPv2 Bearer Response Handler, a critical component responsible for managing bearer context responses in the GPRS Tunneling Protocol version 2 (GTPv2), which is essential for session management in 5G networks. The vulnerability allows an unauthenticated remote attacker to send specially crafted GTPv2 messages that manipulate the Bearer Response Handler, causing the Open5GS service to crash or become unresponsive, resulting in a denial of service condition. This disrupts the availability of 5G core network functions, potentially impacting subscriber connectivity and network reliability. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, and a direct impact on availability. The vulnerability has been publicly disclosed, and a patch is available identified by the commit hash 98f76e98df35cd6a35e868aa62715db7f8141ac1. No known exploits have been observed in the wild yet, but the public disclosure increases the risk of exploitation attempts. Open5GS is used by telecom operators and enterprises deploying private 5G networks, making this vulnerability relevant to critical communication infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-15528 can be significant, especially for telecom operators and enterprises relying on Open5GS for 5G core network functions. A successful denial of service attack could lead to temporary loss of connectivity for subscribers, disruption of critical communication services, and degradation of network performance. This could affect emergency services, industrial automation, and other sectors dependent on reliable 5G connectivity. The disruption may also cause reputational damage and financial losses due to service outages. Since the vulnerability is remotely exploitable without authentication, attackers can launch DoS attacks from outside the network perimeter, increasing the threat surface. Although no data confidentiality or integrity impact is indicated, the availability impact alone can have cascading effects on dependent services and applications. European telecom regulators may also impose compliance and reporting obligations in case of service disruptions caused by this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-15528, organizations should promptly apply the official patch released by the Open5GS project, identified by commit 98f76e98df35cd6a35e868aa62715db7f8141ac1. Network operators should verify that their Open5GS deployments are upgraded beyond version 2.7.6 or have the patch backported. Additionally, monitoring GTPv2 traffic for unusual or malformed bearer response messages can help detect exploitation attempts early. Implementing rate limiting and anomaly detection on GTPv2 interfaces can reduce the risk of DoS attacks. Network segmentation and firewall rules restricting GTPv2 traffic to trusted sources can further limit exposure. Operators should also maintain robust incident response plans to quickly restore services in case of an attack. Regular vulnerability scanning and penetration testing of 5G core components are recommended to identify and remediate similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-16T16:35:43.587Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696ab9f0b22c7ad868fb1a90
Added to database: 1/16/2026, 10:21:36 PM
Last enriched: 1/16/2026, 10:36:29 PM
Last updated: 1/17/2026, 4:01:04 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0820: CWE-862 Missing Authorization in sweetdaisy86 RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress
MediumCVE-2026-0682: CWE-918 Server-Side Request Forgery (SSRF) in andy_moyle Church Admin
LowCVE-2025-14463: CWE-862 Missing Authorization in naa986 Payment Button for PayPal
MediumCVE-2025-13725: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in thimpress Thim Blocks
MediumCVE-2025-15403: CWE-269 Improper Privilege Management in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.