Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15528: Denial of Service in Open5GS

0
Medium
VulnerabilityCVE-2025-15528cvecve-2025-15528
Published: Fri Jan 16 2026 (01/16/2026, 22:02:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability has been found in Open5GS up to 2.7.6. Affected by this vulnerability is an unknown functionality of the component GTPv2 Bearer Response Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 98f76e98df35cd6a35e868aa62715db7f8141ac1. A patch should be applied to remediate this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:13:48 UTC

Technical Analysis

CVE-2025-15528 is a denial of service vulnerability found in Open5GS, an open-source implementation of the 5G core network. The vulnerability affects versions 2.7.0 through 2.7.6 and resides in the GTPv2 Bearer Response Handler component. GTPv2 (GPRS Tunneling Protocol version 2) is critical for signaling and bearer management in 4G and 5G networks. The flaw allows an attacker to remotely send specially crafted messages to the vulnerable component, causing it to malfunction and crash or become unresponsive, resulting in denial of service. The attack requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on availability. The vulnerability has been publicly disclosed, and a patch is available identified by the commit hash 98f76e98df35cd6a35e868aa62715db7f8141ac1. While no active exploitation in the wild has been reported, the public availability of the exploit code increases the likelihood of future attacks. Open5GS is widely used by telecom operators and research institutions for 5G core network deployments, making this vulnerability a significant concern for critical telecommunications infrastructure.

Potential Impact

The primary impact of CVE-2025-15528 is denial of service against Open5GS 5G core network components, specifically the GTPv2 Bearer Response Handler. This can lead to service outages or degraded network performance, affecting subscriber connectivity and network reliability. Telecom operators using Open5GS may experience partial or full disruption of 5G core network functions, potentially impacting voice, data, and signaling services. Given the critical role of 5G core networks in modern communications, this can have cascading effects on emergency services, enterprise connectivity, and consumer mobile services. The vulnerability's ease of exploitation and lack of required authentication make it a viable attack vector for threat actors aiming to disrupt telecommunications infrastructure. While no known active exploitation is reported, the public disclosure of the exploit increases the risk of opportunistic attacks. Organizations relying on Open5GS must consider the operational and reputational risks associated with potential service interruptions.

Mitigation Recommendations

To mitigate CVE-2025-15528, organizations should immediately apply the official patch identified by commit 98f76e98df35cd6a35e868aa62715db7f8141ac1 to all affected Open5GS deployments running versions 2.7.0 through 2.7.6. Network operators should conduct thorough testing in staging environments before production deployment to ensure stability. Additionally, implementing network-level protections such as filtering and rate limiting of GTPv2 traffic can reduce exposure to malformed packets. Monitoring network traffic for anomalies related to GTPv2 Bearer Response messages can help detect attempted exploitation. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can provide additional defense layers. Operators should also maintain strict access controls and segmentation for core network components to limit attack surface. Regularly updating Open5GS and subscribing to security advisories will help promptly address future vulnerabilities. Finally, developing incident response plans specific to 5G core network disruptions will improve organizational readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-16T16:35:43.587Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ab9f0b22c7ad868fb1a90

Added to database: 1/16/2026, 10:21:36 PM

Last enriched: 3/3/2026, 8:13:48 PM

Last updated: 3/24/2026, 12:59:29 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses