CVE-2025-65561: n/a
An issue was discovered in function LocalNode.Sess in free5GC 4.1.0 allowing attackers to cause a denial of service or other unspecified impacts via crafted header Local SEID to the PFCP Session Modification Request.
AI Analysis
Technical Summary
CVE-2025-65561 is a vulnerability identified in the open-source 5G core network implementation free5GC version 4.1.0. The flaw resides in the LocalNode.Sess function, which processes PFCP (Packet Forwarding Control Protocol) Session Modification Requests. Specifically, the vulnerability arises from improper input validation of the Local SEID (Session Endpoint Identifier) header. An attacker can craft a malicious Local SEID header in a PFCP Session Modification Request message to trigger a denial of service (DoS) condition or potentially cause other unspecified impacts on the affected system. The vulnerability is exploitable remotely without requiring any authentication or user interaction, making it accessible to any attacker with network access to the PFCP interface. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, low attack complexity) and the impact on availability. The vulnerability is categorized under CWE-20 (Improper Input Validation), indicating that the root cause is insufficient validation of input data leading to unexpected behavior. While no patches or known exploits are currently reported, the risk is significant given the critical role of free5GC in 5G core network infrastructure. Exploitation could disrupt 5G session management, impacting service continuity and network reliability.
Potential Impact
For European organizations, particularly telecom operators and 5G infrastructure providers, this vulnerability poses a significant risk to network availability. Exploitation could lead to denial of service conditions on core network components, disrupting 5G session management and potentially causing widespread service outages. This can affect mobile broadband services, IoT connectivity, and critical communications relying on 5G networks. The impact extends to enterprises and public services dependent on 5G connectivity, potentially causing operational disruptions and financial losses. Given the increasing reliance on 5G for digital transformation and critical infrastructure, the vulnerability could undermine trust in network reliability and service quality. Additionally, the lack of authentication requirements means that attackers could launch attacks from within or near the network perimeter, increasing the threat surface. Although confidentiality and integrity are not directly impacted, the availability disruption alone can have cascading effects on dependent systems and services.
Mitigation Recommendations
Organizations should monitor free5GC project communications for official patches addressing CVE-2025-65561 and apply them promptly once available. In the interim, network operators should implement strict filtering and validation of PFCP messages at network boundaries to block malformed or suspicious Local SEID headers. Deploying anomaly detection systems focused on PFCP traffic can help identify and mitigate exploitation attempts early. Network segmentation and access controls should restrict PFCP interface access to trusted management and control entities only. Regular security assessments and penetration testing of 5G core components can help identify similar input validation issues. Additionally, operators should maintain robust incident response plans to quickly address potential denial of service events. Collaboration with vendors and open-source communities to share threat intelligence and mitigation strategies is also recommended. Finally, logging and monitoring of PFCP session modification requests should be enhanced to detect unusual patterns indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland
CVE-2025-65561: n/a
Description
An issue was discovered in function LocalNode.Sess in free5GC 4.1.0 allowing attackers to cause a denial of service or other unspecified impacts via crafted header Local SEID to the PFCP Session Modification Request.
AI-Powered Analysis
Technical Analysis
CVE-2025-65561 is a vulnerability identified in the open-source 5G core network implementation free5GC version 4.1.0. The flaw resides in the LocalNode.Sess function, which processes PFCP (Packet Forwarding Control Protocol) Session Modification Requests. Specifically, the vulnerability arises from improper input validation of the Local SEID (Session Endpoint Identifier) header. An attacker can craft a malicious Local SEID header in a PFCP Session Modification Request message to trigger a denial of service (DoS) condition or potentially cause other unspecified impacts on the affected system. The vulnerability is exploitable remotely without requiring any authentication or user interaction, making it accessible to any attacker with network access to the PFCP interface. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (network vector, low attack complexity) and the impact on availability. The vulnerability is categorized under CWE-20 (Improper Input Validation), indicating that the root cause is insufficient validation of input data leading to unexpected behavior. While no patches or known exploits are currently reported, the risk is significant given the critical role of free5GC in 5G core network infrastructure. Exploitation could disrupt 5G session management, impacting service continuity and network reliability.
Potential Impact
For European organizations, particularly telecom operators and 5G infrastructure providers, this vulnerability poses a significant risk to network availability. Exploitation could lead to denial of service conditions on core network components, disrupting 5G session management and potentially causing widespread service outages. This can affect mobile broadband services, IoT connectivity, and critical communications relying on 5G networks. The impact extends to enterprises and public services dependent on 5G connectivity, potentially causing operational disruptions and financial losses. Given the increasing reliance on 5G for digital transformation and critical infrastructure, the vulnerability could undermine trust in network reliability and service quality. Additionally, the lack of authentication requirements means that attackers could launch attacks from within or near the network perimeter, increasing the threat surface. Although confidentiality and integrity are not directly impacted, the availability disruption alone can have cascading effects on dependent systems and services.
Mitigation Recommendations
Organizations should monitor free5GC project communications for official patches addressing CVE-2025-65561 and apply them promptly once available. In the interim, network operators should implement strict filtering and validation of PFCP messages at network boundaries to block malformed or suspicious Local SEID headers. Deploying anomaly detection systems focused on PFCP traffic can help identify and mitigate exploitation attempts early. Network segmentation and access controls should restrict PFCP interface access to trusted management and control entities only. Regular security assessments and penetration testing of 5G core components can help identify similar input validation issues. Additionally, operators should maintain robust incident response plans to quickly address potential denial of service events. Collaboration with vendors and open-source communities to share threat intelligence and mitigation strategies is also recommended. Finally, logging and monitoring of PFCP session modification requests should be enhanced to detect unusual patterns indicative of exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69444e5e4eb3efac36a13dcd
Added to database: 12/18/2025, 6:56:30 PM
Last enriched: 12/25/2025, 7:55:59 PM
Last updated: 2/5/2026, 8:00:11 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25630
LowCVE-2026-1301: CWE-787 Out-of-bounds Write in o6 Automation GmbH Open62541
MediumCVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls
HighCVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.