Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60638: n/a

0
High
VulnerabilityCVE-2025-60638cvecve-2025-60638
Published: Mon Nov 24 2025 (11/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attacker to cause a denial of service via crafted POST request to the Nnssf_NSSAIAvailability API.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:45:58 UTC

Technical Analysis

CVE-2025-60638 is a denial of service (DoS) vulnerability identified in Free5GC versions 4.0.0 and 4.0.1, specifically targeting the Nnssf_NSSAIAvailability API. Free5GC is an open-source 5G core network implementation widely used for research, development, and some production environments. The vulnerability arises from the API's inadequate handling of crafted POST requests, which can exhaust system resources, leading to a crash or unresponsiveness of the affected service. This is classified under CWE-400, indicating uncontrolled resource consumption. The attack requires no authentication or user interaction and can be executed remotely over the network, making exploitation relatively straightforward. The CVSS v3.1 score of 7.5 reflects a high severity due to the significant impact on availability, although confidentiality and integrity remain unaffected. No patches or fixes have been published at the time of disclosure, and no active exploits have been reported. The vulnerability poses a risk to 5G network operators and service providers using Free5GC, potentially causing service disruptions that affect mobile network availability and reliability. Given the critical role of 5G infrastructure, such disruptions could have cascading effects on dependent services and users.

Potential Impact

For European organizations, especially telecommunications providers and infrastructure operators utilizing Free5GC, this vulnerability could lead to significant service outages in 5G core network functions. Disruption of the Nnssf_NSSAIAvailability API can impair network slice selection services, which are essential for managing differentiated 5G services and quality of service guarantees. This could degrade user experience, interrupt critical communications, and impact business operations relying on 5G connectivity. Additionally, service downtime could lead to regulatory scrutiny and financial penalties under European data protection and telecommunications regulations. The broader impact includes potential erosion of trust in 5G services and increased operational costs due to incident response and mitigation efforts. Organizations relying on third-party 5G core providers using Free5GC may also face indirect risks. The lack of known exploits currently provides a window for proactive defense, but the ease of exploitation necessitates urgent attention.

Mitigation Recommendations

Until official patches are released, European organizations should implement strict network access controls to limit exposure of the Nnssf_NSSAIAvailability API to trusted entities only, ideally isolating it behind firewalls or VPNs. Deploying rate limiting and anomaly detection on API endpoints can help identify and block suspicious POST requests indicative of exploitation attempts. Monitoring network traffic and system logs for unusual spikes or failures related to the API is critical for early detection. Organizations should engage with Free5GC community and vendors for timely updates and patches. Conducting thorough security assessments and penetration testing on 5G core components can uncover additional weaknesses. Where feasible, deploying redundant or failover systems can mitigate service disruption impact. Finally, updating incident response plans to include this vulnerability scenario will improve readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6924840cd5a1e53350b3a58d

Added to database: 11/24/2025, 4:13:00 PM

Last enriched: 12/1/2025, 4:45:58 PM

Last updated: 1/8/2026, 10:35:14 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats