Skip to main content

CVE-2025-6952: Reachable Assertion in Open5GS

Medium
VulnerabilityCVE-2025-6952cvecve-2025-6952
Published: Tue Jul 01 2025 (07/01/2025, 11:32:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability, which was classified as problematic, has been found in Open5GS up to 2.7.5. This issue affects the function amf_state_operational of the file src/amf/amf-sm.c of the component AMF Service. The manipulation leads to reachable assertion. It is possible to launch the attack on the local host. The identifier of the patch is 53e9e059ed96b940f7ddcd9a2b68cb512524d5db. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:55:23 UTC

Technical Analysis

CVE-2025-6952 is a medium severity vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The flaw exists in versions 2.7.0 through 2.7.5 within the AMF (Access and Mobility Management Function) service component, specifically in the function amf_state_operational located in the source file src/amf/amf-sm.c. The vulnerability manifests as a reachable assertion failure, which occurs when certain conditions in the code are met, causing the program to terminate unexpectedly. This type of vulnerability can lead to denial of service (DoS) conditions by crashing the AMF service, which is critical for managing user equipment registration, mobility, and session management in 5G networks. The attack vector requires local host access with low privileges (PR:L), no user interaction, and no elevated authentication, indicating that an attacker with limited local access can trigger the assertion failure. The CVSS 4.0 score of 4.8 reflects a medium severity, primarily due to the limited attack vector (local) and the impact being mostly on availability (denial of service) without direct confidentiality or integrity compromise. No known exploits are currently reported in the wild, and a patch has been identified (commit 53e9e059ed96b940f7ddcd9a2b68cb512524d5db) to remediate the issue. The vulnerability does not require network access or user interaction, which limits remote exploitation but still poses a risk in environments where local access can be obtained, such as multi-tenant systems or compromised hosts.

Potential Impact

For European organizations deploying Open5GS as part of their 5G core network infrastructure, this vulnerability could lead to service disruptions due to the AMF component crashing. The AMF is essential for managing subscriber mobility and session states; thus, its failure can cause denial of service to end users, impacting network availability and potentially causing outages in critical communication services. This is particularly significant for telecom operators, private 5G network providers, and enterprises relying on 5G connectivity for operational continuity. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can affect business operations, emergency services, and IoT deployments dependent on 5G connectivity. The requirement for local access reduces the risk of widespread remote exploitation but raises concerns in environments where attackers might gain local footholds, such as through insider threats or lateral movement after initial compromise. Given the strategic importance of 5G infrastructure in Europe’s digital economy and critical services, even medium severity vulnerabilities in core network components warrant prompt attention.

Mitigation Recommendations

European organizations should immediately verify if their Open5GS deployments are running affected versions (2.7.0 to 2.7.5) and apply the official patch identified by commit 53e9e059ed96b940f7ddcd9a2b68cb512524d5db. Beyond patching, it is crucial to restrict and monitor local access to Open5GS hosts, implementing strict access controls and auditing to detect unauthorized local activity. Employing host-based intrusion detection systems (HIDS) can help identify attempts to exploit this vulnerability. Network segmentation should be enforced to isolate 5G core components from less trusted network zones, minimizing the risk of lateral movement. Additionally, organizations should conduct regular security assessments and penetration tests focusing on local privilege escalation and assertion failure scenarios. Maintaining up-to-date backups and failover mechanisms for the AMF service can reduce downtime in case of exploitation. Finally, integrating vulnerability management processes that include monitoring for new Open5GS vulnerabilities and timely patch deployment is essential to maintain a secure 5G core environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-01T05:51:09.919Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6863c9006f40f0eb728f0ed6

Added to database: 7/1/2025, 11:39:44 AM

Last enriched: 7/1/2025, 11:55:23 AM

Last updated: 7/11/2025, 5:02:42 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats