Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56394: n/a

0
High
VulnerabilityCVE-2025-56394cvecve-2025-56394
Published: Tue Sep 23 2025 (09/23/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Free5gc 4.0.1 is vulnerable to Buffer Overflow. The AMF incorrectly validates the 5GS mobile identity, resulting in slice reference overflow.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:45:05 UTC

Technical Analysis

CVE-2025-56394 is a high-severity buffer overflow vulnerability identified in Free5gc version 4.0.1, an open-source 5G core network implementation. The vulnerability arises from improper validation of the 5GS mobile identity within the Access and Mobility Management Function (AMF) component. Specifically, the AMF fails to correctly validate the length or structure of the 5GS mobile identity, leading to a slice reference overflow condition. This type of buffer overflow (classified under CWE-122) can cause memory corruption, potentially resulting in denial of service (DoS) conditions or enabling an attacker to execute arbitrary code or disrupt the availability of the affected system. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although the impact on confidentiality and integrity is not indicated, the vulnerability has a significant impact on availability, with a CVSS score of 7.5 (high severity). No known exploits are currently reported in the wild, and no patches have been linked yet, highlighting the need for proactive mitigation and monitoring. Given Free5gc's role as a 5G core network component, exploitation could disrupt mobile network services relying on this software, affecting network operators and their subscribers.

Potential Impact

For European organizations, particularly telecommunications providers deploying Free5gc 4.0.1 or derivatives thereof, this vulnerability poses a substantial risk to the availability of 5G network services. Disruption of the AMF could lead to denial of service for mobile subscribers, impacting critical communications infrastructure, emergency services, and enterprise connectivity. The 5G core network is foundational for emerging technologies such as IoT, autonomous vehicles, and smart city applications; thus, service interruptions could have cascading effects on various sectors including transportation, healthcare, and manufacturing. Additionally, network operators may face regulatory scrutiny under the EU's NIS2 Directive and GDPR if service disruptions affect data processing or availability. The lack of authentication and user interaction requirements means attackers can potentially launch attacks remotely, increasing the threat surface. While no known exploits exist yet, the public disclosure of this vulnerability necessitates immediate attention to prevent exploitation attempts, especially as threat actors often develop exploits rapidly after disclosure.

Mitigation Recommendations

Organizations should first identify any deployments of Free5gc 4.0.1 within their 5G core network infrastructure. Given the absence of an official patch, immediate mitigations include implementing network-level protections such as strict ingress filtering and anomaly detection to identify malformed 5GS mobile identity messages targeting the AMF. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom signatures to detect abnormal slice reference lengths or malformed packets can help mitigate exploitation attempts. Network segmentation should be enforced to isolate the AMF from less trusted network segments. Operators should engage with the Free5gc community and vendors for updates or patches and plan for rapid deployment once available. Additionally, monitoring AMF logs and network traffic for unusual behavior or crashes can provide early warning signs of exploitation attempts. Conducting regular security assessments and penetration testing focused on 5G core components will help identify residual risks. Finally, updating incident response plans to include scenarios involving 5G core network component compromise is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d2da7bf7fe4c56f0792df4

Added to database: 9/23/2025, 5:35:55 PM

Last enriched: 10/1/2025, 12:45:05 AM

Last updated: 10/7/2025, 1:52:50 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats