Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65568: n/a

0
High
VulnerabilityCVE-2025-65568cvecve-2025-65568
Published: Thu Dec 18 2025 (12/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65568 is a denial-of-service vulnerability in the omec-project UPF, specifically in the pfcpiface component version 2. 1. 3-dev. The flaw arises when a PFCP Session Establishment Request contains a CreateFAR with an empty or truncated IPv4 address field, leading to improper validation. This causes an out-of-bounds read and an index-out-of-range panic during parsing, crashing the UPF. An attacker with access to the UPF's N4/PFCP interface can exploit this to repeatedly disrupt user-plane services. No authentication or user interaction is required, making it easier to exploit. The vulnerability affects the availability of critical 5G core network functions. European telecom operators deploying omec-project UPF are at risk, especially those using the vulnerable version. Mitigation involves patching or implementing strict input validation and network filtering on PFCP messages.

AI-Powered Analysis

AILast updated: 12/18/2025, 19:27:40 UTC

Technical Analysis

CVE-2025-65568 is a denial-of-service vulnerability identified in the omec-project User Plane Function (UPF), specifically within the pfcpiface component version 2.1.3-dev. The vulnerability occurs after a PFCP association is established between the UPF and the control plane. When a PFCP Session Establishment Request is sent containing a CreateFAR (Forwarding Action Rule) with an empty or truncated IPv4 address field, the pfcpiface component fails to properly validate this input. During the parsing process, the function parseFAR() invokes ip2int(), which attempts to convert the IPv4 address to an integer representation. Due to the malformed or incomplete IPv4 address, ip2int() performs an out-of-bounds read on the buffer, causing an index-out-of-range panic that crashes the UPF process. This crash results in denial of service by disrupting the user-plane data forwarding capabilities of the UPF, which is a critical element in 5G core networks responsible for handling user data traffic. An attacker capable of sending PFCP Session Establishment Requests to the UPF's N4/PFCP interface can exploit this vulnerability repeatedly, causing persistent service disruption. No authentication or user interaction is required, increasing the risk of exploitation. The vulnerability does not currently have a CVSS score or known public exploits, but its impact on network availability is significant. The affected software version is upf-epc-pfcpiface:2.1.3-dev, and no patch information is currently available. This vulnerability highlights the importance of robust input validation in telecom network functions, especially in emerging 5G infrastructure components.

Potential Impact

The primary impact of CVE-2025-65568 is the disruption of user-plane services in 5G networks due to repeated crashes of the UPF component. For European organizations, especially telecom operators and service providers deploying the omec-project UPF, this can lead to significant service outages affecting mobile broadband and critical communications. The UPF is responsible for forwarding user data traffic, so its unavailability can degrade network performance, cause dropped connections, and impact end-user experience. This can also affect enterprise customers relying on 5G for critical applications, potentially causing operational disruptions. Additionally, repeated denial-of-service attacks may strain network resources and complicate incident response. Given the increasing reliance on 5G infrastructure across Europe, this vulnerability poses a risk to network reliability and service continuity. Regulatory compliance related to network availability and security may also be impacted if service disruptions occur. The lack of authentication requirements for exploitation increases the threat surface, making it easier for malicious actors to target vulnerable UPF instances remotely.

Mitigation Recommendations

To mitigate CVE-2025-65568, European organizations should first verify if they are running the vulnerable version (upf-epc-pfcpiface:2.1.3-dev) of the omec-project UPF. If so, they should seek patches or updates from the omec-project maintainers as soon as they become available. In the absence of an official patch, organizations should implement strict input validation on PFCP messages at the network edge or within the UPF to detect and reject malformed CreateFAR IPv4 address fields. Network-level filtering and rate limiting on the N4/PFCP interface can reduce the risk of exploitation by limiting the volume of PFCP Session Establishment Requests from untrusted sources. Deploying anomaly detection systems to monitor for unusual PFCP message patterns can provide early warning of exploitation attempts. Segmentation of the control and user planes and restricting access to the N4 interface to trusted management networks can further reduce exposure. Regular security audits and penetration testing focused on PFCP protocol handling will help identify similar weaknesses. Finally, operators should maintain incident response plans tailored to UPF service disruptions to minimize downtime if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694451e44eb3efac36a23a4e

Added to database: 12/18/2025, 7:11:32 PM

Last enriched: 12/18/2025, 7:27:40 PM

Last updated: 12/18/2025, 9:02:31 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats