Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41068: CWE-617 Reachable Assertion in NewPlane Open5GS

0
High
VulnerabilityCVE-2025-41068cvecve-2025-41068cwe-617
Published: Mon Oct 27 2025 (10/27/2025, 12:47:57 UTC)
Source: CVE Database V5
Vendor/Project: NewPlane
Product: Open5GS

Description

CVE-2025-41068 is a high-severity reachable assertion vulnerability in Open5GS up to version 2. 7. 5, a core component used in 5G core networks. Attackers with network access to the Network Repository Function (NRF) can exploit this flaw by sending a request to create a Network Function (NF) with an invalid type via the Service-Based Interface (SBI), then requesting its data. This triggers an assertion check in the NRF that crashes the process, causing a denial of service and rendering the discovery service unresponsive. No authentication or user interaction is required, and the vulnerability can be exploited remotely with low complexity. The impact primarily affects availability of the NRF, a critical 5G core network element responsible for service discovery and registration. European telecom operators deploying Open5GS or derivatives are at risk, especially in countries with advanced 5G infrastructure. Mitigation requires patching or applying vendor fixes once available, restricting network access to the NRF, and implementing robust input validation and anomaly detection on SBI traffic. Countries with significant 5G deployments and active Open5GS usage, such as Germany, France, Italy, Spain, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 10/27/2025, 13:22:47 UTC

Technical Analysis

CVE-2025-41068 is a reachable assertion vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for research and some commercial deployments. The vulnerability affects versions up to 2.7.5 and resides in the Network Repository Function (NRF), which is responsible for maintaining a repository of available Network Functions (NFs) and enabling their discovery via the Service-Based Interface (SBI). An attacker with network connectivity to the NRF can exploit this vulnerability by sending a crafted request to create an NF with an invalid or unexpected type. Subsequently, when the attacker requests data related to this NF, the NRF performs an assertion check that fails, causing the NRF process to crash. This crash leads to a denial of service (DoS) condition, as the NRF becomes unresponsive and unable to provide discovery services to other network functions. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that the assertion failure can be triggered by external input. The CVSS 4.0 vector indicates no required privileges, no user interaction, and no confidentiality, integrity, or availability controls bypassed except for availability, which is highly impacted. The attack surface is the NRF's SBI, which is typically exposed within the operator's core network but could be reachable if network segmentation is insufficient. No known exploits are currently reported in the wild, but the ease of exploitation and critical role of the NRF make this a significant threat. The lack of available patches at the time of publication means operators must rely on network-level mitigations until vendor fixes are released.

Potential Impact

The primary impact of CVE-2025-41068 is a denial of service against the NRF component of the 5G core network. The NRF is essential for service discovery and registration of network functions, so its unavailability can disrupt the operation of the entire 5G core, affecting subscriber connectivity, session management, and service delivery. For European organizations, particularly telecom operators and infrastructure providers deploying Open5GS or similar 5G core solutions, this vulnerability could lead to significant network outages, degraded service quality, and potential revenue loss. The disruption could also affect critical communications services, emergency response capabilities, and enterprise customers relying on 5G connectivity. Given the high reliance on 5G networks for digital transformation and IoT deployments in Europe, the impact extends beyond telecom operators to industries such as manufacturing, transportation, and healthcare. The vulnerability does not directly compromise confidentiality or integrity but severely impacts availability, which is critical for network reliability. The ease of exploitation without authentication increases the risk of opportunistic or targeted attacks, potentially by malicious insiders or external threat actors who gain network access. The lack of known exploits in the wild suggests a window for proactive mitigation, but the threat remains significant due to the critical nature of the affected component.

Mitigation Recommendations

1. Immediate network segmentation: Restrict access to the NRF's Service-Based Interface (SBI) to trusted network segments only, using firewalls, VLANs, or software-defined networking controls to limit exposure. 2. Implement strict input validation and anomaly detection on SBI traffic to detect and block malformed or suspicious NF creation requests. 3. Monitor NRF process health and logs closely to detect crashes or assertion failures early and enable rapid incident response. 4. Deploy redundancy and failover mechanisms for the NRF to maintain service availability in case of crashes. 5. Engage with the Open5GS community and NewPlane vendor for patches or updates addressing CVE-2025-41068 and apply them promptly once available. 6. Conduct regular security assessments and penetration testing focused on 5G core components to identify similar vulnerabilities. 7. Limit administrative and network access to the NRF to authorized personnel and systems only, enforcing strong authentication and access controls. 8. Prepare incident response plans specifically for 5G core network disruptions, including communication strategies with customers and regulators. 9. Consider deploying network function virtualization (NFV) security best practices to isolate and protect critical 5G core functions. 10. Stay informed on threat intelligence related to Open5GS and 5G core vulnerabilities to adapt defenses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:34.458Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff6edbba6dffc5e2f97675

Added to database: 10/27/2025, 1:08:43 PM

Last enriched: 10/27/2025, 1:22:47 PM

Last updated: 10/27/2025, 2:12:50 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats