Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65564: n/a

0
High
VulnerabilityCVE-2025-65564cvecve-2025-65564
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65564 is a denial-of-service vulnerability in the omec-upf component (upf-epc-pfcpiface version 2. 1. 3-dev) that causes the User Plane Function (UPF) process to crash when it receives a malformed PFCP Association Setup Request missing the mandatory Recovery Time Stamp IE. This vulnerability allows an attacker capable of sending PFCP messages to the UPF's N4/PFCP interface to repeatedly crash the UPF, disrupting user-plane services. The flaw arises from a nil pointer dereference due to lack of validation of the Recovery Time Stamp IE, leading to a panic and termination of the UPF process. No known exploits are reported in the wild, and no CVSS score has been assigned. The vulnerability impacts the availability of critical 5G core network components, potentially causing service outages. European telecom operators deploying omec-upf in their 5G infrastructure are at risk, especially those using the affected version. Mitigation requires patching or implementing input validation to ensure mandatory IEs are present before processing. Countries with advanced 5G deployments and significant use of open-source or omec-based UPF implementations are most likely affected.

AI-Powered Analysis

AILast updated: 12/18/2025, 19:26:49 UTC

Technical Analysis

CVE-2025-65564 identifies a denial-of-service vulnerability in the open-source omec-upf component, specifically in the upf-epc-pfcpiface module version 2.1.3-dev. The User Plane Function (UPF) is a critical element in 5G core networks responsible for handling user data traffic. The vulnerability occurs when the UPF receives a PFCP (Packet Forwarding Control Protocol) Association Setup Request message that lacks the mandatory Recovery Time Stamp Information Element (IE). Instead of validating the presence of this IE, the association setup handler attempts to access the RecoveryTimeStamp() method on a nil pointer, causing a runtime panic and crashing the UPF process. This crash results in a denial-of-service condition, disrupting user-plane services and potentially causing outages for subscribers relying on the affected UPF. An attacker with network access to the UPF's N4 interface (PFCP endpoint) can exploit this by sending crafted PFCP messages to repeatedly trigger the crash. The vulnerability does not require authentication beyond network access to the PFCP interface but does require the ability to send PFCP messages, which may be restricted in some deployments. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The lack of input validation for mandatory protocol elements highlights a software robustness issue in the omec-upf implementation. This vulnerability primarily impacts the availability of 5G user-plane services, which are critical for mobile broadband and IoT connectivity. Given the role of UPF in 5G networks, successful exploitation could degrade network performance or cause service interruptions for end users. The vulnerability underscores the importance of rigorous protocol compliance and input validation in telecom network functions.

Potential Impact

The primary impact of CVE-2025-65564 is on the availability of 5G user-plane services managed by the affected UPF component. Repeated exploitation can cause persistent crashes of the UPF process, leading to denial-of-service conditions that interrupt data forwarding for mobile subscribers. For European organizations, especially telecom operators and service providers deploying omec-upf in their 5G core networks, this could result in degraded network performance, customer service outages, and potential revenue loss. Disruptions in user-plane traffic can affect critical services relying on 5G connectivity, including emergency communications, industrial IoT, and enterprise applications. Additionally, repeated crashes may increase operational costs due to incident response and recovery efforts. The vulnerability could also undermine trust in open-source 5G components if not addressed promptly. Although exploitation requires access to the PFCP interface, insider threats or compromised network segments could facilitate attacks. The lack of known exploits in the wild suggests limited current risk, but the potential impact on network availability warrants urgent mitigation. European regulators and operators focused on network resilience and service continuity should prioritize addressing this vulnerability to maintain compliance with service-level agreements and regulatory requirements.

Mitigation Recommendations

To mitigate CVE-2025-65564, European organizations should first verify if their 5G core network deployments use the omec-upf component, specifically version 2.1.3-dev or similar vulnerable releases. Immediate steps include: 1) Implement strict input validation on the PFCP Association Setup Request messages to ensure mandatory Information Elements like the Recovery Time Stamp are present before processing. 2) Apply any available patches or updates from the omec-upf maintainers addressing this vulnerability as soon as they are released. 3) Restrict network access to the UPF's N4/PFCP interface by enforcing network segmentation, firewall rules, and access control lists to limit exposure to trusted management and control entities only. 4) Monitor PFCP traffic for anomalous or malformed messages indicative of exploitation attempts. 5) Employ redundancy and failover mechanisms in UPF deployments to maintain service continuity in case of process crashes. 6) Conduct regular security audits and penetration testing focused on protocol handling robustness in telecom network functions. 7) Collaborate with vendors and open-source communities to track vulnerability disclosures and remediation progress. These targeted measures go beyond generic advice by focusing on protocol-level validation, network access controls specific to PFCP, and operational resilience strategies tailored to telecom infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694451e44eb3efac36a23a5a

Added to database: 12/18/2025, 7:11:32 PM

Last enriched: 12/18/2025, 7:26:49 PM

Last updated: 12/18/2025, 9:45:02 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats