Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15531: Reachable Assertion in Open5GS

0
Medium
VulnerabilityCVE-2025-15531cvecve-2025-15531
Published: Sat Jan 17 2026 (01/17/2026, 16:02:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

CVE-2025-15531 is a medium-severity vulnerability in Open5GS versions up to 2. 7. 5, affecting the sgwc_bearer_add function in the src/sgwc/context. c file. The flaw allows remote attackers to trigger a reachable assertion, potentially causing denial of service. No authentication or user interaction is required, and the exploit is publicly available. The vulnerability has been fixed in later versions. European organizations using Open5GS for 5G core network functions could face service disruptions if unpatched. Mitigation involves promptly updating Open5GS to a patched version and monitoring network components for abnormal crashes. Countries with advanced 5G deployments and Open5GS adoption, such as Germany, France, and the UK, are most at risk.

AI-Powered Analysis

AILast updated: 01/17/2026, 16:26:05 UTC

Technical Analysis

CVE-2025-15531 is a vulnerability identified in the Open5GS project, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw resides in the sgwc_bearer_add function within the src/sgwc/context.c source file, where improper handling of input or state leads to a reachable assertion failure. This assertion can be triggered remotely without requiring any authentication or user interaction, making exploitation feasible over the network. The assertion failure typically results in a denial-of-service (DoS) condition by crashing or destabilizing the Serving Gateway Control Plane (SGWC) component, which is critical for bearer management in 5G networks. The vulnerability affects Open5GS versions 2.7.0 through 2.7.5 and has been publicly disclosed with an available exploit, although no widespread exploitation in the wild has been reported. The issue has been addressed in subsequent patches, emphasizing the importance of upgrading. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a medium impact on availability (VA:L), resulting in a score of 6.9. This vulnerability highlights risks in open-source 5G core components that underpin critical telecommunications infrastructure.

Potential Impact

For European organizations, especially telecom operators and infrastructure providers deploying Open5GS as part of their 5G core network, this vulnerability poses a significant risk of service disruption. The reachable assertion can cause the SGWC component to crash, leading to denial of service for bearer management functions, which are essential for maintaining active user sessions and data flows. This can degrade network availability and quality of service, impacting both enterprise and consumer users. Given the remote exploitability without authentication, attackers could disrupt services from outside the network perimeter. The availability impact could cascade to affect emergency services, IoT deployments, and critical communications reliant on 5G networks. Additionally, organizations relying on Open5GS for private 5G networks in industrial or governmental contexts may face operational interruptions. The public availability of exploits increases the urgency for mitigation. However, no direct confidentiality or integrity compromise is indicated, limiting the impact primarily to availability.

Mitigation Recommendations

To mitigate CVE-2025-15531, European organizations should immediately upgrade Open5GS installations to versions beyond 2.7.5 where the vulnerability is fixed. If upgrading is not immediately feasible, applying any available patches or workarounds recommended by the Open5GS community is critical. Network operators should implement strict network segmentation and firewall rules to restrict access to the SGWC interfaces, limiting exposure to untrusted networks. Continuous monitoring of SGWC logs and system health metrics can help detect abnormal crashes or assertion failures indicative of exploitation attempts. Employing intrusion detection systems (IDS) tuned for Open5GS anomalies can provide early warning. Additionally, organizations should conduct thorough audits of their 5G core deployments to identify any legacy or vulnerable Open5GS instances. Coordinating with national cybersecurity agencies and telecom regulators for threat intelligence sharing will enhance situational awareness. Finally, incorporating robust incident response plans specific to 5G core disruptions will improve resilience against potential attacks exploiting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-16T16:35:53.556Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696bb4c1d302b072d90bbe20

Added to database: 1/17/2026, 4:11:45 PM

Last enriched: 1/17/2026, 4:26:05 PM

Last updated: 1/17/2026, 5:40:17 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats