CVE-2025-65565: n/a
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association is established, a PFCP Session Establishment Request that is missing the mandatory F-SEID (CPF-SEID) Information Element is not properly validated. The session establishment handler calls IE.FSEID() on a nil pointer, which triggers a panic and terminates the UPF process. An attacker who can send PFCP Session Establishment Request messages to the UPF's N4/PFCP endpoint can exploit this issue to repeatedly crash the UPF and disrupt user-plane services.
AI Analysis
Technical Summary
CVE-2025-65565 is a denial-of-service vulnerability identified in the omec-project User Plane Function (UPF), specifically in the pfcpiface component version 2.1.3-dev. The vulnerability arises during the handling of PFCP (Packet Forwarding Control Protocol) Session Establishment Requests. After a PFCP association is established, the UPF expects a mandatory F-SEID (Fully Qualified SEID) Information Element in the session establishment request. However, the pfcpiface component does not properly validate the presence of this IE. When a request lacking the F-SEID IE is received, the session establishment handler attempts to call IE.FSEID() on a nil pointer, causing a runtime panic that crashes the UPF process. This results in a denial-of-service condition, disrupting the user-plane services managed by the UPF. The vulnerability can be exploited remotely by an attacker who can send PFCP Session Establishment Requests to the UPF's N4/PFCP endpoint without requiring authentication or user interaction. The CVSS v3.1 base score is 7.5, indicating a high-severity issue with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). No patches or known exploits are currently reported, but the vulnerability stems from a null pointer dereference (CWE-476), a common programming error. The UPF is a critical component in 5G core networks responsible for forwarding user data traffic, making this vulnerability significant in telecom environments using the omec-project UPF implementation.
Potential Impact
The primary impact of CVE-2025-65565 is on the availability of the UPF component within 5G core networks. Exploitation causes the UPF process to crash repeatedly, leading to denial of user-plane services such as data forwarding and session management. For European organizations, particularly telecom operators and service providers deploying omec-project UPF, this can result in significant service disruptions affecting end users and enterprise customers relying on 5G connectivity. The loss of UPF availability can degrade network performance, cause dropped sessions, and impact critical services dependent on 5G data transport. Since the vulnerability does not affect confidentiality or integrity, data breaches or manipulation are not direct concerns. However, the disruption of user-plane traffic can have cascading effects on business operations, emergency services, and IoT deployments. The ease of exploitation (no authentication or user interaction required) increases the risk of targeted or opportunistic attacks. European telecom infrastructure with widespread 5G adoption and open-source UPF deployments are particularly vulnerable, potentially affecting national communications and digital economy sectors.
Mitigation Recommendations
To mitigate CVE-2025-65565, affected organizations should prioritize the following actions: 1) Apply vendor-supplied patches or updates to the omec-project UPF pfcpiface component once available. 2) Implement strict input validation on PFCP messages at the network edge or firewall level to detect and block malformed PFCP Session Establishment Requests missing mandatory IEs such as F-SEID. 3) Deploy anomaly detection systems monitoring PFCP traffic for unusual patterns indicative of malformed or malicious session establishment attempts. 4) Use network segmentation and access controls to restrict which entities can send PFCP messages to the UPF N4 interface, limiting exposure to untrusted sources. 5) Maintain robust logging and alerting on UPF process crashes and PFCP errors to enable rapid incident response. 6) Consider redundancy and failover mechanisms for UPF instances to maintain service continuity in case of crashes. 7) Engage with the omec-project community and security advisories for timely updates and best practices. These measures go beyond generic advice by focusing on protocol-level filtering, network access restrictions, and operational monitoring tailored to the UPF and PFCP context.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-65565: n/a
Description
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association is established, a PFCP Session Establishment Request that is missing the mandatory F-SEID (CPF-SEID) Information Element is not properly validated. The session establishment handler calls IE.FSEID() on a nil pointer, which triggers a panic and terminates the UPF process. An attacker who can send PFCP Session Establishment Request messages to the UPF's N4/PFCP endpoint can exploit this issue to repeatedly crash the UPF and disrupt user-plane services.
AI-Powered Analysis
Technical Analysis
CVE-2025-65565 is a denial-of-service vulnerability identified in the omec-project User Plane Function (UPF), specifically in the pfcpiface component version 2.1.3-dev. The vulnerability arises during the handling of PFCP (Packet Forwarding Control Protocol) Session Establishment Requests. After a PFCP association is established, the UPF expects a mandatory F-SEID (Fully Qualified SEID) Information Element in the session establishment request. However, the pfcpiface component does not properly validate the presence of this IE. When a request lacking the F-SEID IE is received, the session establishment handler attempts to call IE.FSEID() on a nil pointer, causing a runtime panic that crashes the UPF process. This results in a denial-of-service condition, disrupting the user-plane services managed by the UPF. The vulnerability can be exploited remotely by an attacker who can send PFCP Session Establishment Requests to the UPF's N4/PFCP endpoint without requiring authentication or user interaction. The CVSS v3.1 base score is 7.5, indicating a high-severity issue with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). No patches or known exploits are currently reported, but the vulnerability stems from a null pointer dereference (CWE-476), a common programming error. The UPF is a critical component in 5G core networks responsible for forwarding user data traffic, making this vulnerability significant in telecom environments using the omec-project UPF implementation.
Potential Impact
The primary impact of CVE-2025-65565 is on the availability of the UPF component within 5G core networks. Exploitation causes the UPF process to crash repeatedly, leading to denial of user-plane services such as data forwarding and session management. For European organizations, particularly telecom operators and service providers deploying omec-project UPF, this can result in significant service disruptions affecting end users and enterprise customers relying on 5G connectivity. The loss of UPF availability can degrade network performance, cause dropped sessions, and impact critical services dependent on 5G data transport. Since the vulnerability does not affect confidentiality or integrity, data breaches or manipulation are not direct concerns. However, the disruption of user-plane traffic can have cascading effects on business operations, emergency services, and IoT deployments. The ease of exploitation (no authentication or user interaction required) increases the risk of targeted or opportunistic attacks. European telecom infrastructure with widespread 5G adoption and open-source UPF deployments are particularly vulnerable, potentially affecting national communications and digital economy sectors.
Mitigation Recommendations
To mitigate CVE-2025-65565, affected organizations should prioritize the following actions: 1) Apply vendor-supplied patches or updates to the omec-project UPF pfcpiface component once available. 2) Implement strict input validation on PFCP messages at the network edge or firewall level to detect and block malformed PFCP Session Establishment Requests missing mandatory IEs such as F-SEID. 3) Deploy anomaly detection systems monitoring PFCP traffic for unusual patterns indicative of malformed or malicious session establishment attempts. 4) Use network segmentation and access controls to restrict which entities can send PFCP messages to the UPF N4 interface, limiting exposure to untrusted sources. 5) Maintain robust logging and alerting on UPF process crashes and PFCP errors to enable rapid incident response. 6) Consider redundancy and failover mechanisms for UPF instances to maintain service continuity in case of crashes. 7) Engage with the omec-project community and security advisories for timely updates and best practices. These measures go beyond generic advice by focusing on protocol-level filtering, network access restrictions, and operational monitoring tailored to the UPF and PFCP context.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694451e44eb3efac36a23a5e
Added to database: 12/18/2025, 7:11:32 PM
Last enriched: 12/25/2025, 7:56:56 PM
Last updated: 2/4/2026, 3:20:09 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.