Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15532: Resource Consumption in Open5GS

0
Medium
VulnerabilityCVE-2025-15532cvecve-2025-15532
Published: Sat Jan 17 2026 (01/17/2026, 16:32:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A security flaw has been discovered in Open5GS up to 2.7.5. This issue affects some unknown processing of the component Timer Handler. The manipulation results in resource consumption. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The patch is identified as c7c131f8d2cb1195ada5e0e691b6868ebcd8a845. It is best practice to apply a patch to resolve this issue.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:44:38 UTC

Technical Analysis

CVE-2025-15532 is a vulnerability discovered in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw exists in the Timer Handler component, where certain processing can be manipulated remotely to cause excessive resource consumption. This leads to a denial-of-service (DoS) condition by exhausting CPU or memory resources, potentially degrading or interrupting 5G core network services. The vulnerability affects Open5GS versions 2.7.0 through 2.7.5. Exploitation requires no authentication or user interaction and can be performed over the network, making it accessible to remote attackers. The CVSS 4.0 score of 6.9 reflects a medium severity with a network attack vector, low attack complexity, and no privileges required. Although no known exploits in the wild have been reported, a public exploit has been released, increasing the risk of exploitation. The issue can be remediated by applying the patch identified by commit c7c131f8d2cb1195ada5e0e691b6868ebcd8a845. Given Open5GS's role in managing 5G core functions such as session management and mobility, this vulnerability poses a risk to the availability and reliability of mobile network services. The flaw does not impact confidentiality or integrity directly but can cause service outages, affecting end users and dependent services.

Potential Impact

For European organizations, particularly telecom operators and infrastructure providers using Open5GS, this vulnerability can lead to denial-of-service conditions that disrupt 5G core network operations. Such disruptions can degrade mobile broadband services, IoT connectivity, and critical communications relying on 5G networks. The impact extends to enterprises and public sector entities dependent on 5G for digital transformation, smart city applications, and emergency services. Service outages may result in financial losses, reputational damage, and regulatory scrutiny under EU telecom and data protection regulations. The risk is heightened by the availability of a public exploit and the remote, unauthenticated nature of the attack. Organizations operating in countries with advanced 5G deployments and Open5GS adoption face increased exposure. Maintaining network availability is critical to meet service level agreements and national digital infrastructure resilience goals.

Mitigation Recommendations

1. Immediately apply the official patch identified by commit c7c131f8d2cb1195ada5e0e691b6868ebcd8a845 to all affected Open5GS instances. 2. Restrict network access to Open5GS management and control interfaces using firewalls and network segmentation to limit exposure to untrusted networks. 3. Implement resource usage monitoring and alerting on Open5GS nodes to detect abnormal CPU or memory consumption indicative of exploitation attempts. 4. Employ rate limiting and traffic filtering to mitigate potential attack traffic targeting the Timer Handler component. 5. Conduct regular vulnerability scanning and penetration testing focused on 5G core network components. 6. Maintain an incident response plan tailored for telecom infrastructure to quickly address potential DoS attacks. 7. Coordinate with upstream vendors and open-source communities for timely updates and threat intelligence sharing. 8. Consider deploying redundant Open5GS instances and load balancing to improve resilience against resource exhaustion attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-16T16:35:56.438Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696bbf4dd302b072d90ebe7c

Added to database: 1/17/2026, 4:56:45 PM

Last enriched: 1/24/2026, 7:44:38 PM

Last updated: 2/7/2026, 12:04:17 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats