CVE-2025-15555: Stack-based Buffer Overflow in Open5GS
A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function hss_ogs_diam_cx_mar_cb of the file src/hss/hss-cx-path.c of the component VoLTE Cx-Test. The manipulation of the argument OGS_KEY_LEN results in stack-based buffer overflow. The attack may be launched remotely. The patch is identified as 54dda041211098730221d0ae20a2f9f9173e7a21. A patch should be applied to remediate this issue.
AI Analysis
Technical Summary
CVE-2025-15555 is a stack-based buffer overflow vulnerability found in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The vulnerability exists in the function hss_ogs_diam_cx_mar_cb within the src/hss/hss-cx-path.c file, part of the VoLTE Cx-Test component. The issue stems from improper validation and handling of the OGS_KEY_LEN argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can corrupt adjacent memory, potentially leading to arbitrary code execution, denial of service, or information disclosure. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability at a low level (VC:L, VI:L, VA:L). The vulnerability affects Open5GS versions 2.7.0 through 2.7.6. A patch has been released (commit 54dda041211098730221d0ae20a2f9f9173e7a21) to fix the issue by properly validating the OGS_KEY_LEN parameter and preventing buffer overflow. No public exploits have been reported yet, but the nature of the vulnerability makes it a significant concern for operators running vulnerable Open5GS instances in production environments.
Potential Impact
For European organizations, especially telecom operators and mobile network providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a risk of remote compromise. Exploitation could allow attackers to execute arbitrary code or cause denial of service, disrupting critical telecommunications services such as VoLTE and other 5G functionalities. This could lead to service outages, data leakage, or manipulation of network signaling messages, impacting subscriber confidentiality and network integrity. Given the increasing reliance on 5G networks for critical communications, industrial IoT, and emergency services, the potential impact extends beyond typical IT disruptions to affect public safety and economic activities. The medium severity rating suggests that while exploitation is feasible, the impact is somewhat limited, but the critical nature of telecom infrastructure elevates the operational risk. Organizations failing to patch promptly may face targeted attacks or collateral damage from opportunistic threat actors scanning for vulnerable Open5GS deployments.
Mitigation Recommendations
European organizations should immediately assess their Open5GS deployments to identify affected versions (2.7.0 through 2.7.6). The primary mitigation is to apply the official patch referenced by commit 54dda041211098730221d0ae20a2f9f9173e7a21, which corrects the buffer overflow by validating the OGS_KEY_LEN parameter. Network segmentation should be enforced to restrict access to the VoLTE Cx-Test interface, limiting exposure to untrusted networks. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous DIAMETER protocol messages may help identify exploitation attempts. Regularly auditing and monitoring logs for unusual activity related to the hss_ogs_diam_cx_mar_cb function or DIAMETER signaling can provide early warning. Organizations should also review their incident response plans for telecom infrastructure compromises and ensure backups and failover mechanisms are tested. Finally, engaging with Open5GS community updates and security advisories will help maintain awareness of emerging threats and patches.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-15555: Stack-based Buffer Overflow in Open5GS
Description
A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function hss_ogs_diam_cx_mar_cb of the file src/hss/hss-cx-path.c of the component VoLTE Cx-Test. The manipulation of the argument OGS_KEY_LEN results in stack-based buffer overflow. The attack may be launched remotely. The patch is identified as 54dda041211098730221d0ae20a2f9f9173e7a21. A patch should be applied to remediate this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-15555 is a stack-based buffer overflow vulnerability found in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The vulnerability exists in the function hss_ogs_diam_cx_mar_cb within the src/hss/hss-cx-path.c file, part of the VoLTE Cx-Test component. The issue stems from improper validation and handling of the OGS_KEY_LEN argument, which can be manipulated by an attacker to overflow the stack buffer. This overflow can corrupt adjacent memory, potentially leading to arbitrary code execution, denial of service, or information disclosure. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability at a low level (VC:L, VI:L, VA:L). The vulnerability affects Open5GS versions 2.7.0 through 2.7.6. A patch has been released (commit 54dda041211098730221d0ae20a2f9f9173e7a21) to fix the issue by properly validating the OGS_KEY_LEN parameter and preventing buffer overflow. No public exploits have been reported yet, but the nature of the vulnerability makes it a significant concern for operators running vulnerable Open5GS instances in production environments.
Potential Impact
For European organizations, especially telecom operators and mobile network providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a risk of remote compromise. Exploitation could allow attackers to execute arbitrary code or cause denial of service, disrupting critical telecommunications services such as VoLTE and other 5G functionalities. This could lead to service outages, data leakage, or manipulation of network signaling messages, impacting subscriber confidentiality and network integrity. Given the increasing reliance on 5G networks for critical communications, industrial IoT, and emergency services, the potential impact extends beyond typical IT disruptions to affect public safety and economic activities. The medium severity rating suggests that while exploitation is feasible, the impact is somewhat limited, but the critical nature of telecom infrastructure elevates the operational risk. Organizations failing to patch promptly may face targeted attacks or collateral damage from opportunistic threat actors scanning for vulnerable Open5GS deployments.
Mitigation Recommendations
European organizations should immediately assess their Open5GS deployments to identify affected versions (2.7.0 through 2.7.6). The primary mitigation is to apply the official patch referenced by commit 54dda041211098730221d0ae20a2f9f9173e7a21, which corrects the buffer overflow by validating the OGS_KEY_LEN parameter. Network segmentation should be enforced to restrict access to the VoLTE Cx-Test interface, limiting exposure to untrusted networks. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous DIAMETER protocol messages may help identify exploitation attempts. Regularly auditing and monitoring logs for unusual activity related to the hss_ogs_diam_cx_mar_cb function or DIAMETER signaling can provide early warning. Organizations should also review their incident response plans for telecom infrastructure compromises and ensure backups and failover mechanisms are tested. Finally, engaging with Open5GS community updates and security advisories will help maintain awareness of emerging threats and patches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-02T19:02:29.323Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983afd5f9fa50a62fabdb1f
Added to database: 2/4/2026, 8:45:09 PM
Last enriched: 2/4/2026, 9:02:01 PM
Last updated: 2/6/2026, 9:32:16 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24928: CWE-680 Integer Overflow to Buffer Overflow in Huawei HarmonyOS
MediumCVE-2026-24927: CWE-416 Use After Free in Huawei HarmonyOS
MediumCVE-2026-24924: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2026-24920: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2026-2012: SQL Injection in itsourcecode Student Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.