Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65567: n/a

0
High
VulnerabilityCVE-2025-65567cvecve-2025-65567
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a specially crafted PFCP Session Establishment Request with a CreatePDR that contains a malformed Flow-Description is not robustly validated. The Flow-Description parser (parseFlowDesc) can read beyond the bounds of the provided buffer, causing a panic and terminating the UPF process. An attacker who can send PFCP Session Establishment Request messages to the UPF's N4/PFCP endpoint can exploit this issue to repeatedly crash the UPF.

AI-Powered Analysis

AILast updated: 12/25/2025, 19:57:22 UTC

Technical Analysis

CVE-2025-65567 identifies a denial-of-service vulnerability in the omec-project User Plane Function (UPF), specifically within the pfcpiface component version 2.1.3-dev. The vulnerability stems from insufficient validation of the Flow-Description field in a PFCP Session Establishment Request message. The Flow-Description parser (parseFlowDesc) fails to properly check the bounds of the input buffer, resulting in a buffer over-read (CWE-125). When a specially crafted PFCP message containing a malformed Flow-Description is processed, the parser reads beyond the allocated memory, causing a panic that terminates the UPF process. The UPF is a fundamental element in 5G core networks, handling user data forwarding and traffic management. The attack vector requires no privileges or user interaction and can be executed remotely by sending malicious PFCP messages to the UPF's N4/PFCP interface. The CVSS v3.1 score is 7.5 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). Although no known exploits are reported in the wild, the vulnerability poses a significant risk to network stability and service continuity. The lack of available patches necessitates immediate defensive measures to mitigate potential exploitation.

Potential Impact

For European organizations, particularly telecom operators and 5G service providers using the omec-project UPF, this vulnerability can cause repeated denial-of-service conditions, leading to service outages and degraded network performance. The UPF is critical for user plane traffic management; its disruption can interrupt subscriber data flows, impacting end-user experience and potentially violating service level agreements. The availability impact could cascade, affecting dependent network functions and services. Given the increasing reliance on 5G infrastructure across Europe for critical communications, industrial automation, and IoT, such outages could have broader economic and operational consequences. Additionally, repeated crashes may increase operational costs due to emergency response and recovery efforts. While confidentiality and integrity are not directly impacted, the availability degradation alone is significant for network operators and their customers.

Mitigation Recommendations

1. Implement strict input validation and boundary checks in the Flow-Description parser within the pfcpiface component to prevent buffer over-read conditions. 2. Deploy network-level filtering and access controls to restrict PFCP traffic to trusted sources only, minimizing exposure of the UPF's N4/PFCP endpoint to untrusted networks. 3. Monitor PFCP traffic for anomalous or malformed Session Establishment Requests indicative of exploitation attempts. 4. Employ redundancy and failover mechanisms for UPF instances to maintain service continuity during potential crashes. 5. Engage with the omec-project community or vendors for patches or updated versions addressing this vulnerability as they become available. 6. Conduct regular security assessments and penetration testing focused on PFCP interfaces to identify and remediate similar issues proactively. 7. Consider isolating UPF components in segmented network zones with strict ingress filtering to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694451e44eb3efac36a23a4b

Added to database: 12/18/2025, 7:11:32 PM

Last enriched: 12/25/2025, 7:57:22 PM

Last updated: 2/4/2026, 4:41:36 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats