Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41068: CWE-617 Reachable Assertion in NewPlane Open5GS

0
High
VulnerabilityCVE-2025-41068cvecve-2025-41068cwe-617
Published: Mon Oct 27 2025 (10/27/2025, 12:47:57 UTC)
Source: CVE Database V5
Vendor/Project: NewPlane
Product: Open5GS

Description

Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. This is achieved by sending the creation of an NF with an invalid type via SBI and then requesting its data. The NRF executes a check that crashes the process, leaving the discovery service unresponsive.

AI-Powered Analysis

AILast updated: 11/03/2025, 14:08:34 UTC

Technical Analysis

CVE-2025-41068 is a reachable assertion vulnerability identified in the Open5GS project, specifically affecting versions up to 2.7.6. Open5GS is an open-source implementation of the 5G core network, widely used for research, testing, and in some production environments. The vulnerability resides in the Network Repository Function (NRF), which is responsible for service discovery and registration of Network Functions (NFs) within the 5G core. An attacker with network connectivity to the NRF can exploit this flaw by sending a crafted request to create an NF with an invalid or unexpected type via the Service-Based Interface (SBI). Subsequently, when the attacker requests data related to this NF, the NRF performs an assertion check that fails due to the invalid NF type, causing the NRF process to crash. This crash leads to a denial of service (DoS) condition, making the NRF unavailable and disrupting the discovery and registration services critical for 5G core operations. The vulnerability requires no authentication or user interaction, making it remotely exploitable with low complexity. The CVSS 4.0 score of 8.7 reflects the high impact on availability and the ease of exploitation. While no public exploits have been reported yet, the nature of the vulnerability poses a significant risk to the stability of 5G networks relying on Open5GS. The lack of available patches at the time of publication increases the urgency for operators to implement interim mitigations or monitor for suspicious activity targeting the NRF.

Potential Impact

The primary impact of CVE-2025-41068 is a denial of service against the NRF component of the 5G core network, which is essential for the discovery and registration of network functions. For European organizations, particularly telecom operators and service providers deploying Open5GS or similar open-source 5G core solutions, this vulnerability could lead to significant service disruptions. The NRF becoming unresponsive can cause cascading failures in network function discovery, impairing the overall 5G core functionality, potentially affecting subscriber connectivity, service delivery, and network management. This disruption could degrade user experience, impact critical communications, and cause financial and reputational damage. Given the increasing reliance on 5G for industrial, governmental, and consumer applications across Europe, the availability of the core network is paramount. Furthermore, attackers exploiting this vulnerability do not require authentication, increasing the risk of opportunistic attacks. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score indicates that exploitation could have widespread consequences if weaponized.

Mitigation Recommendations

1. Immediate network segmentation and access control: Restrict network access to the NRF service to trusted management and network functions only, minimizing exposure to untrusted networks. 2. Implement strict input validation and filtering at the network perimeter to block malformed or suspicious SBI requests attempting to create NFs with invalid types. 3. Monitor NRF logs and network traffic for anomalous requests that attempt to create or query NFs with unexpected or invalid parameters. 4. Engage with the Open5GS community and vendor to obtain patches or updates addressing this vulnerability as soon as they become available. 5. Consider deploying redundancy and failover mechanisms for the NRF to maintain service availability in case of crashes. 6. Conduct regular security assessments and penetration testing focused on the 5G core components to identify and remediate similar vulnerabilities proactively. 7. Develop incident response plans specific to 5G core network disruptions to minimize downtime and coordinate rapid recovery. 8. Where possible, apply runtime protections such as sandboxing or process isolation for the NRF to limit the impact of crashes. 9. Keep all 5G core network components updated with the latest security patches and advisories from vendors and open-source projects.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:34.458Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6edbba6dffc5e2f97675

Added to database: 10/27/2025, 1:08:43 PM

Last enriched: 11/3/2025, 2:08:34 PM

Last updated: 12/12/2025, 4:16:06 AM

Views: 163

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats