Skip to main content

CVE-2025-52322: n/a

Unknown
VulnerabilityCVE-2025-52322cvecve-2025-52322
Published: Tue Sep 09 2025 (09/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Open5GS v2.7.2 and before allows a remote attacker to cause a denial of service via a crafted Create Session Request message to the SMF (PGW-C), using the IP address of a legitimate UE in the PDN Address Allocation (PAA) field

AI-Powered Analysis

AILast updated: 09/09/2025, 15:20:03 UTC

Technical Analysis

CVE-2025-52322 is a vulnerability identified in Open5GS version 2.7.2 and earlier, which affects the Session Management Function (SMF), also known as the Packet Gateway Control plane (PGW-C), within the 5G core network infrastructure. The flaw allows a remote attacker to trigger a denial of service (DoS) condition by sending a specially crafted Create Session Request message. This message manipulates the PDN Address Allocation (PAA) field by inserting the IP address of a legitimate User Equipment (UE). The vulnerability arises because the SMF improperly handles this crafted request, leading to resource exhaustion or service disruption. Since the SMF is critical for managing session establishment and IP address allocation in 5G networks, exploitation can interrupt subscriber connectivity and degrade network availability. The attack does not require authentication or user interaction, enabling remote exploitation by an unauthenticated attacker with network access to the SMF interface. No CVSS score has been assigned yet, and no known exploits have been reported in the wild as of the publication date. However, the potential for disruption in 5G core network operations makes this a significant concern for operators using vulnerable Open5GS versions.

Potential Impact

For European organizations, particularly telecom operators and service providers deploying Open5GS as part of their 5G core network infrastructure, this vulnerability poses a risk of service outages and degraded network performance. Disruption of the SMF can lead to denial of service for subscribers, impacting both consumer and enterprise customers relying on 5G connectivity. This can affect critical services such as IoT deployments, emergency communications, and industrial automation that depend on reliable 5G sessions. Additionally, prolonged outages could result in regulatory penalties under EU telecom regulations and damage to operator reputation. Given the increasing reliance on 5G networks across Europe, the impact extends beyond telecom providers to sectors such as healthcare, transportation, and finance that utilize 5G connectivity for mission-critical applications.

Mitigation Recommendations

Operators should prioritize upgrading Open5GS to versions beyond 2.7.2 where this vulnerability is addressed. In the absence of an official patch, network administrators should implement strict filtering and validation of Create Session Request messages at the SMF interface to detect and block malformed requests containing suspicious PDN Address Allocation fields. Deploying anomaly detection systems to monitor unusual session creation patterns can help identify exploitation attempts early. Network segmentation and limiting exposure of the SMF control plane to trusted management networks reduce the attack surface. Additionally, operators should conduct thorough security assessments and penetration testing focused on 5G core components to identify similar weaknesses. Maintaining up-to-date threat intelligence feeds and collaborating with vendors and CERTs will facilitate timely response to emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c0456a12a58f153632f07b

Added to database: 9/9/2025, 3:19:06 PM

Last enriched: 9/9/2025, 3:20:03 PM

Last updated: 9/10/2025, 12:36:45 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats