CVE-2025-5935: Denial of Service in Open5GS
A vulnerability was found in Open5GS up to 2.7.3. It has been declared as problematic. Affected by this vulnerability is the function common_register_state of the file src/mme/emm-sm.c of the component AMF/MME. The manipulation of the argument ran_ue_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5. It is recommended to apply a patch to fix this issue.
AI Analysis
Technical Summary
CVE-2025-5935 is a medium-severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.3, specifically within the function common_register_state located in the src/mme/emm-sm.c file of the AMF/MME component. Open5GS is an open-source implementation of 5G core network elements, widely used for mobile network infrastructure. The vulnerability arises from improper handling of the ran_ue_id argument, which can be manipulated by an attacker to cause a denial of service (DoS) condition. This manipulation leads to the disruption of the affected component, potentially causing service outages in the 5G core network's Access and Mobility Management Function (AMF) or Mobility Management Entity (MME). The attack vector is remote and requires no authentication or user interaction, making exploitation relatively straightforward. The vulnerability has been publicly disclosed, and a patch identified by commit 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5 is available to remediate the issue. The CVSS v4.0 base score is 6.9, reflecting a medium severity level, with the attack complexity low, no privileges required, and no user interaction needed. While no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation attempts.
Potential Impact
For European organizations, especially telecommunications providers and infrastructure operators deploying Open5GS as part of their 5G core network, this vulnerability poses a risk of service disruption. A successful DoS attack could degrade or completely interrupt mobile network services, affecting voice, data, and signaling traffic. This could impact critical communications, emergency services, and enterprise connectivity relying on 5G networks. The disruption could also lead to reputational damage and regulatory scrutiny under frameworks such as the EU NIS Directive and GDPR if service availability is compromised. Given the remote and unauthenticated nature of the exploit, attackers could launch attacks from outside the network perimeter, increasing the threat surface. The medium severity score reflects that while confidentiality and integrity are not directly impacted, availability is significantly affected, which is critical for telecom operators.
Mitigation Recommendations
European organizations should prioritize applying the official patch identified by commit 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5 to all affected Open5GS instances immediately. Beyond patching, network operators should implement strict network segmentation and filtering to limit exposure of the AMF/MME interfaces to untrusted networks. Deploying anomaly detection systems to monitor for unusual signaling traffic or malformed ran_ue_id values can help detect exploitation attempts early. Rate limiting and connection throttling on signaling interfaces may reduce the impact of DoS attempts. Operators should also review their incident response plans to address potential 5G core network outages and coordinate with upstream providers and regulators. Regular vulnerability scanning and security audits of Open5GS deployments will help ensure no unpatched instances remain. Finally, maintaining up-to-date threat intelligence feeds can provide early warnings of emerging exploits targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-5935: Denial of Service in Open5GS
Description
A vulnerability was found in Open5GS up to 2.7.3. It has been declared as problematic. Affected by this vulnerability is the function common_register_state of the file src/mme/emm-sm.c of the component AMF/MME. The manipulation of the argument ran_ue_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5. It is recommended to apply a patch to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-5935 is a medium-severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.3, specifically within the function common_register_state located in the src/mme/emm-sm.c file of the AMF/MME component. Open5GS is an open-source implementation of 5G core network elements, widely used for mobile network infrastructure. The vulnerability arises from improper handling of the ran_ue_id argument, which can be manipulated by an attacker to cause a denial of service (DoS) condition. This manipulation leads to the disruption of the affected component, potentially causing service outages in the 5G core network's Access and Mobility Management Function (AMF) or Mobility Management Entity (MME). The attack vector is remote and requires no authentication or user interaction, making exploitation relatively straightforward. The vulnerability has been publicly disclosed, and a patch identified by commit 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5 is available to remediate the issue. The CVSS v4.0 base score is 6.9, reflecting a medium severity level, with the attack complexity low, no privileges required, and no user interaction needed. While no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation attempts.
Potential Impact
For European organizations, especially telecommunications providers and infrastructure operators deploying Open5GS as part of their 5G core network, this vulnerability poses a risk of service disruption. A successful DoS attack could degrade or completely interrupt mobile network services, affecting voice, data, and signaling traffic. This could impact critical communications, emergency services, and enterprise connectivity relying on 5G networks. The disruption could also lead to reputational damage and regulatory scrutiny under frameworks such as the EU NIS Directive and GDPR if service availability is compromised. Given the remote and unauthenticated nature of the exploit, attackers could launch attacks from outside the network perimeter, increasing the threat surface. The medium severity score reflects that while confidentiality and integrity are not directly impacted, availability is significantly affected, which is critical for telecom operators.
Mitigation Recommendations
European organizations should prioritize applying the official patch identified by commit 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5 to all affected Open5GS instances immediately. Beyond patching, network operators should implement strict network segmentation and filtering to limit exposure of the AMF/MME interfaces to untrusted networks. Deploying anomaly detection systems to monitor for unusual signaling traffic or malformed ran_ue_id values can help detect exploitation attempts early. Rate limiting and connection throttling on signaling interfaces may reduce the impact of DoS attempts. Operators should also review their incident response plans to address potential 5G core network outages and coordinate with upstream providers and regulators. Regular vulnerability scanning and security audits of Open5GS deployments will help ensure no unpatched instances remain. Finally, maintaining up-to-date threat intelligence feeds can provide early warnings of emerging exploits targeting this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-09T15:33:47.465Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68487f561b0bd07c3938a408
Added to database: 6/10/2025, 6:54:14 PM
Last enriched: 7/11/2025, 12:48:57 AM
Last updated: 8/2/2025, 12:29:47 PM
Views: 17
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.