CVE-2025-44951: n/a
A missing length check in `ogs_pfcp_dev_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dev` field with a value with length greater than 32.
AI Analysis
Technical Summary
CVE-2025-44951 is a buffer overflow vulnerability identified in the PFCP (Packet Forwarding Control Protocol) library used by Open5GS versions 2.7.2 and earlier. The vulnerability arises from a missing length check in the function `ogs_pfcp_dev_add`, specifically when handling the `session.dev` field. This field is intended to hold a value with a maximum length of 32 bytes, but the absence of proper validation allows a local attacker to supply a value exceeding this length. As a result, the attacker can trigger a buffer overflow condition. Given that PFCP is a critical protocol used in 5G core network components such as the Session Management Function (SMF) and User Plane Function (UPF), exploitation of this vulnerability could lead to memory corruption, potentially causing application crashes, denial of service, or even arbitrary code execution within these network functions. The vulnerability requires local access to the affected system, as the attacker must be able to invoke the vulnerable function with a crafted `session.dev` field. There is no indication that remote exploitation is possible without local privileges. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability was reserved in April 2025 and published in June 2025, indicating it is a recent discovery. The lack of a CVSS score suggests that the severity assessment must be inferred from the technical details. Overall, this vulnerability poses a significant risk to the integrity and availability of 5G core network components running Open5GS, particularly in environments where local access is attainable by an attacker.
Potential Impact
For European organizations, especially telecommunications providers and enterprises deploying private 5G networks, this vulnerability could have serious consequences. Open5GS is an open-source 5G core network implementation widely used for research, development, and increasingly in production environments. A successful exploitation could disrupt critical 5G network functions, leading to service outages affecting end-users and enterprise customers. This could degrade network availability and reliability, impacting sectors reliant on 5G connectivity such as manufacturing, transportation, healthcare, and public safety. Furthermore, if exploited to execute arbitrary code, attackers could gain control over SMF or UPF components, potentially enabling further lateral movement within the network or manipulation of user sessions, compromising confidentiality and integrity of data flows. Given the strategic importance of 5G infrastructure in Europe’s digital economy and critical infrastructure, such disruptions could have cascading effects on national security and economic stability. The requirement for local access somewhat limits the attack surface to insiders or attackers who have already breached perimeter defenses, but the impact remains high due to the critical role of the affected components.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting local access to systems running Open5GS SMF and UPF components. Implement strict access controls, including multi-factor authentication and network segmentation, to limit potential attackers’ ability to reach these services. 2. Monitor logs and system behavior for unusual activity related to PFCP session management, particularly any attempts to set or modify the `session.dev` field with abnormal lengths. 3. Apply runtime protections such as Address Space Layout Randomization (ASLR), stack canaries, and memory protection mechanisms to reduce the risk of successful exploitation of buffer overflows. 4. Engage with the Open5GS community or vendors to obtain patches or updates addressing this vulnerability as soon as they become available. 5. Conduct code audits and fuzz testing on the PFCP library and related functions to identify and remediate similar input validation issues proactively. 6. For organizations deploying Open5GS in production, consider deploying intrusion detection systems (IDS) or endpoint detection and response (EDR) solutions capable of detecting exploitation attempts targeting buffer overflow conditions. 7. Establish incident response plans specifically tailored to 5G core network components to ensure rapid containment and recovery in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland
CVE-2025-44951: n/a
Description
A missing length check in `ogs_pfcp_dev_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dev` field with a value with length greater than 32.
AI-Powered Analysis
Technical Analysis
CVE-2025-44951 is a buffer overflow vulnerability identified in the PFCP (Packet Forwarding Control Protocol) library used by Open5GS versions 2.7.2 and earlier. The vulnerability arises from a missing length check in the function `ogs_pfcp_dev_add`, specifically when handling the `session.dev` field. This field is intended to hold a value with a maximum length of 32 bytes, but the absence of proper validation allows a local attacker to supply a value exceeding this length. As a result, the attacker can trigger a buffer overflow condition. Given that PFCP is a critical protocol used in 5G core network components such as the Session Management Function (SMF) and User Plane Function (UPF), exploitation of this vulnerability could lead to memory corruption, potentially causing application crashes, denial of service, or even arbitrary code execution within these network functions. The vulnerability requires local access to the affected system, as the attacker must be able to invoke the vulnerable function with a crafted `session.dev` field. There is no indication that remote exploitation is possible without local privileges. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability was reserved in April 2025 and published in June 2025, indicating it is a recent discovery. The lack of a CVSS score suggests that the severity assessment must be inferred from the technical details. Overall, this vulnerability poses a significant risk to the integrity and availability of 5G core network components running Open5GS, particularly in environments where local access is attainable by an attacker.
Potential Impact
For European organizations, especially telecommunications providers and enterprises deploying private 5G networks, this vulnerability could have serious consequences. Open5GS is an open-source 5G core network implementation widely used for research, development, and increasingly in production environments. A successful exploitation could disrupt critical 5G network functions, leading to service outages affecting end-users and enterprise customers. This could degrade network availability and reliability, impacting sectors reliant on 5G connectivity such as manufacturing, transportation, healthcare, and public safety. Furthermore, if exploited to execute arbitrary code, attackers could gain control over SMF or UPF components, potentially enabling further lateral movement within the network or manipulation of user sessions, compromising confidentiality and integrity of data flows. Given the strategic importance of 5G infrastructure in Europe’s digital economy and critical infrastructure, such disruptions could have cascading effects on national security and economic stability. The requirement for local access somewhat limits the attack surface to insiders or attackers who have already breached perimeter defenses, but the impact remains high due to the critical role of the affected components.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting local access to systems running Open5GS SMF and UPF components. Implement strict access controls, including multi-factor authentication and network segmentation, to limit potential attackers’ ability to reach these services. 2. Monitor logs and system behavior for unusual activity related to PFCP session management, particularly any attempts to set or modify the `session.dev` field with abnormal lengths. 3. Apply runtime protections such as Address Space Layout Randomization (ASLR), stack canaries, and memory protection mechanisms to reduce the risk of successful exploitation of buffer overflows. 4. Engage with the Open5GS community or vendors to obtain patches or updates addressing this vulnerability as soon as they become available. 5. Conduct code audits and fuzz testing on the PFCP library and related functions to identify and remediate similar input validation issues proactively. 6. For organizations deploying Open5GS in production, consider deploying intrusion detection systems (IDS) or endpoint detection and response (EDR) solutions capable of detecting exploitation attempts targeting buffer overflow conditions. 7. Establish incident response plans specifically tailored to 5G core network components to ensure rapid containment and recovery in case of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6852df6133c7acc046ee1a19
Added to database: 6/18/2025, 3:46:41 PM
Last enriched: 6/18/2025, 4:02:06 PM
Last updated: 8/11/2025, 1:59:41 AM
Views: 24
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.