CVE-2025-41067: CWE-617 Reachable Assertion in NewPlane Open5GS
Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. An SBI request that deletes the NRF's own registry causes a check that ends up crashing the NRF process and renders the discovery service unavailable.
AI Analysis
Technical Summary
CVE-2025-41067 is a reachable assertion vulnerability classified under CWE-617 affecting NewPlane's Open5GS product, specifically versions up to 2.7.6. Open5GS is an open-source 5G core network implementation widely used for 5G network functions, including the Network Repository Function (NRF), which manages service discovery and registration within the 5G core. The vulnerability arises when an attacker with network connectivity to the NRF sends a Service-Based Interface (SBI) request designed to delete the NRF's own registry data. This triggers an assertion check within the NRF code that is reachable and fails, causing the NRF process to crash. The crash results in a denial of service (DoS) condition, rendering the discovery service unavailable and potentially disrupting 5G core network operations dependent on the NRF. The vulnerability requires no privileges, authentication, or user interaction, making it remotely exploitable with low complexity. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L) indicates network attack vector, low attack complexity, no privileges or user interaction required, no impact on confidentiality or integrity, but high impact on availability. No patches or mitigations have been published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability highlights a critical weakness in input validation and error handling in the NRF component of Open5GS, which could be leveraged to disrupt 5G network services.
Potential Impact
The primary impact of CVE-2025-41067 is a denial of service on the NRF component of Open5GS, which is critical for 5G core network service discovery and registration. For European organizations, especially telecom operators and 5G service providers relying on Open5GS, this can lead to significant network disruptions, affecting service availability for end-users and enterprise customers. Disruption of the NRF can cascade to other 5G core functions that depend on it, potentially degrading overall network performance and reliability. This could impact critical communications infrastructure, emergency services, and industrial IoT applications that rely on 5G connectivity. The lack of authentication and ease of exploitation increase the risk of opportunistic or targeted attacks. Given the strategic importance of 5G networks in Europe’s digital economy and public safety, this vulnerability poses a substantial operational risk. Additionally, denial of service conditions can lead to financial losses, reputational damage, and regulatory scrutiny under European data protection and telecom regulations.
Mitigation Recommendations
Until an official patch is released, European organizations should implement strict network segmentation and access controls to limit connectivity to the NRF interface only to trusted internal systems and management networks. Deploy firewall rules or network ACLs to block unauthorized SBI requests targeting the NRF. Monitor network traffic for anomalous SBI delete requests or unexpected registry modification attempts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect suspicious NRF interactions. Consider deploying redundancy and failover mechanisms for the NRF to minimize service disruption in case of crashes. Engage with NewPlane and Open5GS community for updates and patches, and plan for rapid deployment once available. Conduct thorough security assessments and penetration testing focused on 5G core components to identify similar weaknesses. Document incident response procedures specifically for NRF service outages to ensure rapid recovery. Finally, maintain up-to-date backups of NRF registry data if feasible to aid in recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland
CVE-2025-41067: CWE-617 Reachable Assertion in NewPlane Open5GS
Description
Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. An SBI request that deletes the NRF's own registry causes a check that ends up crashing the NRF process and renders the discovery service unavailable.
AI-Powered Analysis
Technical Analysis
CVE-2025-41067 is a reachable assertion vulnerability classified under CWE-617 affecting NewPlane's Open5GS product, specifically versions up to 2.7.6. Open5GS is an open-source 5G core network implementation widely used for 5G network functions, including the Network Repository Function (NRF), which manages service discovery and registration within the 5G core. The vulnerability arises when an attacker with network connectivity to the NRF sends a Service-Based Interface (SBI) request designed to delete the NRF's own registry data. This triggers an assertion check within the NRF code that is reachable and fails, causing the NRF process to crash. The crash results in a denial of service (DoS) condition, rendering the discovery service unavailable and potentially disrupting 5G core network operations dependent on the NRF. The vulnerability requires no privileges, authentication, or user interaction, making it remotely exploitable with low complexity. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L) indicates network attack vector, low attack complexity, no privileges or user interaction required, no impact on confidentiality or integrity, but high impact on availability. No patches or mitigations have been published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability highlights a critical weakness in input validation and error handling in the NRF component of Open5GS, which could be leveraged to disrupt 5G network services.
Potential Impact
The primary impact of CVE-2025-41067 is a denial of service on the NRF component of Open5GS, which is critical for 5G core network service discovery and registration. For European organizations, especially telecom operators and 5G service providers relying on Open5GS, this can lead to significant network disruptions, affecting service availability for end-users and enterprise customers. Disruption of the NRF can cascade to other 5G core functions that depend on it, potentially degrading overall network performance and reliability. This could impact critical communications infrastructure, emergency services, and industrial IoT applications that rely on 5G connectivity. The lack of authentication and ease of exploitation increase the risk of opportunistic or targeted attacks. Given the strategic importance of 5G networks in Europe’s digital economy and public safety, this vulnerability poses a substantial operational risk. Additionally, denial of service conditions can lead to financial losses, reputational damage, and regulatory scrutiny under European data protection and telecom regulations.
Mitigation Recommendations
Until an official patch is released, European organizations should implement strict network segmentation and access controls to limit connectivity to the NRF interface only to trusted internal systems and management networks. Deploy firewall rules or network ACLs to block unauthorized SBI requests targeting the NRF. Monitor network traffic for anomalous SBI delete requests or unexpected registry modification attempts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect suspicious NRF interactions. Consider deploying redundancy and failover mechanisms for the NRF to minimize service disruption in case of crashes. Engage with NewPlane and Open5GS community for updates and patches, and plan for rapid deployment once available. Conduct thorough security assessments and penetration testing focused on 5G core components to identify similar weaknesses. Document incident response procedures specifically for NRF service outages to ensure rapid recovery. Finally, maintain up-to-date backups of NRF registry data if feasible to aid in recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:34.457Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff6edbba6dffc5e2f97671
Added to database: 10/27/2025, 1:08:43 PM
Last enriched: 11/3/2025, 2:08:16 PM
Last updated: 12/11/2025, 10:00:36 AM
Views: 154
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-7096: SQL Injection in code-projects Faculty Management System
MediumCVE-2025-64701: Privilege chaining in QualitySoft Corporation QND Premium/Advance/Standard
HighCVE-2025-14512: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-67694
UnknownCVE-2025-67693
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.