Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15531: Reachable Assertion in Open5GS

0
Medium
VulnerabilityCVE-2025-15531cvecve-2025-15531
Published: Sat Jan 17 2026 (01/17/2026, 16:02:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was identified in Open5GS up to 2.7.5. This vulnerability affects the function sgwc_bearer_add of the file src/sgwc/context.c. The manipulation leads to reachable assertion. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The issue report is flagged as already-fixed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:41:45 UTC

Technical Analysis

CVE-2025-15531 is a vulnerability identified in Open5GS, an open-source 5G core network implementation widely used by telecom operators and network infrastructure providers. The flaw exists in the sgwc_bearer_add function within the src/sgwc/context.c source file. Specifically, the vulnerability manifests as a reachable assertion triggered by crafted input that manipulates bearer context addition logic. When exploited, this assertion failure can cause the affected process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable without requiring any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability affects Open5GS versions 2.7.0 through 2.7.5 inclusively. Although an exploit is publicly available, there have been no confirmed reports of exploitation in the wild. The issue has been addressed and fixed in subsequent releases beyond version 2.7.5. The CVSS 4.0 base score of 6.9 reflects the medium severity, primarily due to the impact on availability and the ease of remote exploitation. The vulnerability does not affect confidentiality or integrity, nor does it require privileges or user interaction. This vulnerability highlights the importance of securing 5G core network components, which are critical for modern telecommunications infrastructure.

Potential Impact

The primary impact of CVE-2025-15531 is a denial of service against Open5GS deployments, which can disrupt 5G core network operations. A successful exploit causes the sgwc process to crash due to assertion failure, potentially leading to service outages or degraded network performance. This can affect mobile network operators relying on Open5GS for session management and bearer control, impacting end-user connectivity and service availability. In large-scale deployments, repeated exploitation could cause significant network instability and operational challenges. While the vulnerability does not compromise data confidentiality or integrity, the availability impact on critical telecom infrastructure can have cascading effects on emergency services, enterprise communications, and consumer mobile services. The ease of remote exploitation without authentication increases the risk profile, especially in environments where Open5GS is exposed to untrusted networks. Organizations that do not promptly patch may face increased risk of service disruption and potential reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-15531, organizations should immediately upgrade Open5GS to the latest version beyond 2.7.5 where the vulnerability is fixed. If immediate upgrade is not feasible, network administrators should restrict access to the affected sgwc service using network segmentation and firewall rules to limit exposure to trusted management networks only. Implementing strict ingress filtering and monitoring for anomalous bearer addition requests can help detect exploitation attempts. Additionally, deploying runtime monitoring and automated process recovery can reduce downtime caused by crashes. Regularly auditing Open5GS configurations and applying security patches promptly is critical. Telecom operators should also consider deploying redundancy and failover mechanisms in their 5G core infrastructure to minimize service impact from potential DoS events. Finally, maintaining awareness of public exploit releases and threat intelligence feeds will help in proactive defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-16T16:35:53.556Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696bb4c1d302b072d90bbe20

Added to database: 1/17/2026, 4:11:45 PM

Last enriched: 2/23/2026, 10:41:45 PM

Last updated: 3/25/2026, 3:35:38 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses