Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66786: n/a

0
High
VulnerabilityCVE-2025-66786cvecve-2025-66786
Published: Wed Jan 07 2026 (01/07/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

OpenAirInterface CN5G AMF<=v2.0.1 There is a logical error when processing JSON format requests. Unauthorized remote attackers can send malicious JSON data to AMF's SBI interface to launch a denial-of-service attack.

AI-Powered Analysis

AILast updated: 01/07/2026, 16:58:00 UTC

Technical Analysis

CVE-2025-66786 identifies a logical error vulnerability in OpenAirInterface CN5G Access and Mobility Management Function (AMF) software versions up to 2.0.1. The AMF is a critical component of the 5G core network responsible for managing connection and mobility of user equipment. The vulnerability arises from improper handling of JSON-formatted requests sent to the AMF's Service-Based Interface (SBI). Specifically, an attacker can craft malicious JSON data that exploits this logical flaw to trigger a denial-of-service (DoS) condition, effectively disrupting the AMF's operation. This attack vector is notable because it does not require authentication, allowing any remote attacker with network access to the SBI interface to exploit it. The SBI interface typically uses HTTP/2 and RESTful APIs for communication between 5G core network functions, making it a critical attack surface. The vulnerability's exploitation leads to resource exhaustion or crashes in the AMF, causing service interruptions in the 5G network. No patches or fixes are currently linked, and no public exploits have been reported, but the vulnerability is published and reserved under CVE-2025-66786. The lack of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, particularly telecom operators and 5G service providers, this vulnerability poses a significant risk to network availability and service continuity. Exploitation can lead to denial-of-service conditions in the AMF, disrupting user mobility management and potentially causing widespread 5G service outages. This can affect critical services relying on 5G connectivity, including emergency communications, IoT deployments, and industrial automation. The disruption could also result in financial losses, reputational damage, and regulatory scrutiny under EU cybersecurity and telecom regulations. Given the increasing reliance on 5G infrastructure across Europe, the impact extends beyond telecom operators to enterprises and consumers dependent on stable mobile connectivity. The vulnerability's remote exploitability without authentication increases the threat level, as attackers can launch attacks from outside the network perimeter if the SBI interface is exposed or insufficiently protected.

Mitigation Recommendations

European organizations should immediately assess their deployment of OpenAirInterface CN5G AMF and identify instances running versions up to 2.0.1. Until patches are available, implement strict network segmentation to isolate the SBI interface from untrusted networks and restrict access to trusted management and core network segments only. Deploy Web Application Firewalls (WAFs) or API gateways capable of validating and sanitizing JSON payloads to detect and block malformed or suspicious requests targeting the SBI interface. Enable comprehensive logging and real-time monitoring of SBI traffic to identify anomalous patterns indicative of exploitation attempts. Collaborate with OpenAirInterface developers and vendors to obtain security updates and apply patches promptly once released. Additionally, conduct regular security audits and penetration testing focused on 5G core network components to uncover and remediate similar logical errors. Educate network operations teams on this vulnerability to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695e8cf77349d0379db03200

Added to database: 1/7/2026, 4:42:31 PM

Last enriched: 1/7/2026, 4:58:00 PM

Last updated: 1/9/2026, 2:10:34 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats