Skip to main content

CVE-2025-5935: Denial of Service in Open5GS

Medium
VulnerabilityCVE-2025-5935cvecve-2025-5935
Published: Tue Jun 10 2025 (06/10/2025, 04:33:57 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: Open5GS

Description

A vulnerability was found in Open5GS up to 2.7.3. It has been declared as problematic. Affected by this vulnerability is the function common_register_state of the file src/mme/emm-sm.c of the component AMF/MME. The manipulation of the argument ran_ue_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 07/11/2025, 00:48:57 UTC

Technical Analysis

CVE-2025-5935 is a medium-severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.3, specifically within the function common_register_state located in the src/mme/emm-sm.c file of the AMF/MME component. Open5GS is an open-source implementation of 5G core network elements, widely used for mobile network infrastructure. The vulnerability arises from improper handling of the ran_ue_id argument, which can be manipulated by an attacker to cause a denial of service (DoS) condition. This manipulation leads to the disruption of the affected component, potentially causing service outages in the 5G core network's Access and Mobility Management Function (AMF) or Mobility Management Entity (MME). The attack vector is remote and requires no authentication or user interaction, making exploitation relatively straightforward. The vulnerability has been publicly disclosed, and a patch identified by commit 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5 is available to remediate the issue. The CVSS v4.0 base score is 6.9, reflecting a medium severity level, with the attack complexity low, no privileges required, and no user interaction needed. While no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation attempts.

Potential Impact

For European organizations, especially telecommunications providers and infrastructure operators deploying Open5GS as part of their 5G core network, this vulnerability poses a risk of service disruption. A successful DoS attack could degrade or completely interrupt mobile network services, affecting voice, data, and signaling traffic. This could impact critical communications, emergency services, and enterprise connectivity relying on 5G networks. The disruption could also lead to reputational damage and regulatory scrutiny under frameworks such as the EU NIS Directive and GDPR if service availability is compromised. Given the remote and unauthenticated nature of the exploit, attackers could launch attacks from outside the network perimeter, increasing the threat surface. The medium severity score reflects that while confidentiality and integrity are not directly impacted, availability is significantly affected, which is critical for telecom operators.

Mitigation Recommendations

European organizations should prioritize applying the official patch identified by commit 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5 to all affected Open5GS instances immediately. Beyond patching, network operators should implement strict network segmentation and filtering to limit exposure of the AMF/MME interfaces to untrusted networks. Deploying anomaly detection systems to monitor for unusual signaling traffic or malformed ran_ue_id values can help detect exploitation attempts early. Rate limiting and connection throttling on signaling interfaces may reduce the impact of DoS attempts. Operators should also review their incident response plans to address potential 5G core network outages and coordinate with upstream providers and regulators. Regular vulnerability scanning and security audits of Open5GS deployments will help ensure no unpatched instances remain. Finally, maintaining up-to-date threat intelligence feeds can provide early warnings of emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-09T15:33:47.465Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f561b0bd07c3938a408

Added to database: 6/10/2025, 6:54:14 PM

Last enriched: 7/11/2025, 12:48:57 AM

Last updated: 8/2/2025, 12:29:47 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats