Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60632: n/a

0
Unknown
VulnerabilityCVE-2025-60632cvecve-2025-60632
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attacker to cause a denial of service via crafted POST request to the Npcf_BDTPolicyControl API.

AI-Powered Analysis

AILast updated: 11/24/2025, 16:13:24 UTC

Technical Analysis

CVE-2025-60632 is a denial of service (DoS) vulnerability identified in Free5GC versions 4.0.0 and 4.0.1, which are open-source implementations of the 5G core network. The vulnerability arises from improper handling of POST requests sent to the Npcf_BDTPolicyControl API, a network function responsible for managing the binding and data transfer policies within the 5G core. An attacker can craft a malicious POST request that triggers a failure condition in this API, causing the affected network function to crash or become unresponsive. This results in denial of service, potentially disrupting the 5G core network's ability to enforce policy control and manage data traffic effectively. The vulnerability does not require authentication or user interaction, making it easier for remote attackers to exploit if they have network access to the API endpoint. Although no known exploits have been reported in the wild, the impact on availability of critical 5G infrastructure components is significant. The lack of a CVSS score indicates that the vulnerability is newly published and has not yet undergone formal severity assessment. Free5GC is increasingly adopted by telecom operators and research institutions for 5G core network deployments, making this vulnerability relevant to organizations relying on this software for their 5G infrastructure.

Potential Impact

The primary impact of CVE-2025-60632 is the disruption of 5G core network services due to denial of service on the Npcf_BDTPolicyControl API. For European organizations, especially telecom operators and service providers deploying Free5GC, this could lead to partial or complete loss of policy control functions, affecting subscriber data routing and quality of service enforcement. Such disruptions may degrade network performance, cause service outages, and impact end-user connectivity and experience. Given the critical role of 5G networks in supporting IoT, industrial automation, and emergency services, the vulnerability could have broader economic and societal consequences. Additionally, denial of service conditions could be leveraged as part of multi-stage attacks targeting telecom infrastructure. The absence of authentication requirements for exploitation increases the risk of remote attacks from within or near the network perimeter. European organizations involved in 5G research, development, and deployment using Free5GC are particularly vulnerable, potentially affecting national telecom infrastructure resilience and security.

Mitigation Recommendations

To mitigate CVE-2025-60632, European organizations should prioritize upgrading Free5GC to a patched version once available from the maintainers. In the interim, network administrators should implement strict access controls and firewall rules to restrict access to the Npcf_BDTPolicyControl API endpoint, allowing only trusted network entities to communicate with it. Deploying Web Application Firewalls (WAFs) or API gateways capable of detecting and blocking malformed or suspicious POST requests can reduce exposure. Monitoring network traffic for unusual patterns targeting the policy control API is recommended to detect potential exploitation attempts early. Additionally, organizations should conduct thorough input validation and implement rate limiting on API endpoints to prevent flooding attacks. Regular security audits and penetration testing focused on 5G core components can help identify and remediate similar vulnerabilities proactively. Collaboration with Free5GC developers and the wider 5G security community is advised to stay informed about patches and best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69248078d5a1e53350b07798

Added to database: 11/24/2025, 3:57:44 PM

Last enriched: 11/24/2025, 4:13:24 PM

Last updated: 11/24/2025, 5:25:19 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats