Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41067: CWE-617 Reachable Assertion in NewPlane Open5GS

0
High
VulnerabilityCVE-2025-41067cvecve-2025-41067cwe-617
Published: Mon Oct 27 2025 (10/27/2025, 12:47:32 UTC)
Source: CVE Database V5
Vendor/Project: NewPlane
Product: Open5GS

Description

Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. An SBI request that deletes the NRF's own registry causes a check that ends up crashing the NRF process and renders the discovery service unavailable.

AI-Powered Analysis

AILast updated: 11/03/2025, 14:08:16 UTC

Technical Analysis

CVE-2025-41067 is a reachable assertion vulnerability classified under CWE-617 affecting NewPlane's Open5GS product, specifically versions up to 2.7.6. Open5GS is an open-source 5G core network implementation widely used for 5G network functions, including the Network Repository Function (NRF), which manages service discovery and registration within the 5G core. The vulnerability arises when an attacker with network connectivity to the NRF sends a Service-Based Interface (SBI) request designed to delete the NRF's own registry data. This triggers an assertion check within the NRF code that is reachable and fails, causing the NRF process to crash. The crash results in a denial of service (DoS) condition, rendering the discovery service unavailable and potentially disrupting 5G core network operations dependent on the NRF. The vulnerability requires no privileges, authentication, or user interaction, making it remotely exploitable with low complexity. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L) indicates network attack vector, low attack complexity, no privileges or user interaction required, no impact on confidentiality or integrity, but high impact on availability. No patches or mitigations have been published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability highlights a critical weakness in input validation and error handling in the NRF component of Open5GS, which could be leveraged to disrupt 5G network services.

Potential Impact

The primary impact of CVE-2025-41067 is a denial of service on the NRF component of Open5GS, which is critical for 5G core network service discovery and registration. For European organizations, especially telecom operators and 5G service providers relying on Open5GS, this can lead to significant network disruptions, affecting service availability for end-users and enterprise customers. Disruption of the NRF can cascade to other 5G core functions that depend on it, potentially degrading overall network performance and reliability. This could impact critical communications infrastructure, emergency services, and industrial IoT applications that rely on 5G connectivity. The lack of authentication and ease of exploitation increase the risk of opportunistic or targeted attacks. Given the strategic importance of 5G networks in Europe’s digital economy and public safety, this vulnerability poses a substantial operational risk. Additionally, denial of service conditions can lead to financial losses, reputational damage, and regulatory scrutiny under European data protection and telecom regulations.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict network segmentation and access controls to limit connectivity to the NRF interface only to trusted internal systems and management networks. Deploy firewall rules or network ACLs to block unauthorized SBI requests targeting the NRF. Monitor network traffic for anomalous SBI delete requests or unexpected registry modification attempts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect suspicious NRF interactions. Consider deploying redundancy and failover mechanisms for the NRF to minimize service disruption in case of crashes. Engage with NewPlane and Open5GS community for updates and patches, and plan for rapid deployment once available. Conduct thorough security assessments and penetration testing focused on 5G core components to identify similar weaknesses. Document incident response procedures specifically for NRF service outages to ensure rapid recovery. Finally, maintain up-to-date backups of NRF registry data if feasible to aid in recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:34.457Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6edbba6dffc5e2f97671

Added to database: 10/27/2025, 1:08:43 PM

Last enriched: 11/3/2025, 2:08:16 PM

Last updated: 12/11/2025, 10:00:36 AM

Views: 154

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats