CVE-2025-8698: Reachable Assertion in Open5GS
A vulnerability was found in Open5GS up to 2.7.5. It has been classified as problematic. Affected is the function amf_nsmf_pdusession_handle_release_sm_context of the file src/amf/nsmf-handler.c of the component AMF Service. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The name of the patch is 66bc558e417e70ae216ec155e4e81c14ae0ecf30. It is recommended to apply a patch to fix this issue.
AI Analysis
Technical Summary
CVE-2025-8698 is a medium severity vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The flaw exists in versions 2.7.0 through 2.7.5 within the AMF (Access and Mobility Management Function) Service component, specifically in the function amf_nsmf_pdusession_handle_release_sm_context located in src/amf/nsmf-handler.c. The vulnerability manifests as a reachable assertion triggered by crafted local input, which can cause the program to abort unexpectedly. This reachable assertion indicates that under certain conditions, the software encounters an assertion failure that is reachable through local manipulation, potentially leading to denial of service or disruption of the affected AMF service. Exploitation requires local access with low privileges (PR:L) and no user interaction, making it somewhat less accessible remotely but still a concern for insiders or compromised local accounts. The vulnerability does not impact confidentiality, integrity, or availability directly beyond causing service disruption. The CVSS 4.0 base score is 4.8 (medium), reflecting the limited scope and local attack vector. A patch identified by commit 66bc558e417e70ae216ec155e4e81c14ae0ecf30 has been released to address this issue. No known exploits are currently observed in the wild, but public disclosure means attackers could develop exploits. Given Open5GS's role in 5G core networks, this vulnerability could affect network stability and reliability if exploited, especially in environments where Open5GS is deployed as a core network component.
Potential Impact
For European organizations, especially telecom operators and enterprises deploying private 5G networks using Open5GS, this vulnerability could lead to service interruptions in the AMF component, which is critical for managing user mobility and session contexts. Disruptions could degrade network performance or cause temporary denial of service, impacting end-user connectivity and service availability. While the vulnerability requires local access, compromised internal systems or insider threats could exploit it to destabilize network functions. This could affect critical infrastructure providers, industrial automation relying on 5G, and public safety networks. The impact is primarily on availability and operational continuity rather than data breach or unauthorized access. Given the increasing adoption of Open5GS in private and public 5G deployments across Europe, the vulnerability poses a tangible risk to network reliability and service quality.
Mitigation Recommendations
Organizations should promptly apply the official patch identified by commit 66bc558e417e70ae216ec155e4e81c14ae0ecf30 to all affected Open5GS instances. Beyond patching, it is critical to enforce strict access controls to limit local access to the AMF service hosts, including implementing robust authentication and authorization mechanisms for administrative and operational accounts. Network segmentation should isolate core network components to reduce the risk of local exploitation. Continuous monitoring and logging of AMF service behavior can help detect abnormal assertion failures or crashes indicative of exploitation attempts. Additionally, conducting regular security audits and penetration testing focusing on local privilege escalation and insider threat vectors will help identify and remediate potential attack paths. Organizations should also maintain up-to-date incident response plans tailored to 5G core network disruptions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland
CVE-2025-8698: Reachable Assertion in Open5GS
Description
A vulnerability was found in Open5GS up to 2.7.5. It has been classified as problematic. Affected is the function amf_nsmf_pdusession_handle_release_sm_context of the file src/amf/nsmf-handler.c of the component AMF Service. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The name of the patch is 66bc558e417e70ae216ec155e4e81c14ae0ecf30. It is recommended to apply a patch to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-8698 is a medium severity vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The flaw exists in versions 2.7.0 through 2.7.5 within the AMF (Access and Mobility Management Function) Service component, specifically in the function amf_nsmf_pdusession_handle_release_sm_context located in src/amf/nsmf-handler.c. The vulnerability manifests as a reachable assertion triggered by crafted local input, which can cause the program to abort unexpectedly. This reachable assertion indicates that under certain conditions, the software encounters an assertion failure that is reachable through local manipulation, potentially leading to denial of service or disruption of the affected AMF service. Exploitation requires local access with low privileges (PR:L) and no user interaction, making it somewhat less accessible remotely but still a concern for insiders or compromised local accounts. The vulnerability does not impact confidentiality, integrity, or availability directly beyond causing service disruption. The CVSS 4.0 base score is 4.8 (medium), reflecting the limited scope and local attack vector. A patch identified by commit 66bc558e417e70ae216ec155e4e81c14ae0ecf30 has been released to address this issue. No known exploits are currently observed in the wild, but public disclosure means attackers could develop exploits. Given Open5GS's role in 5G core networks, this vulnerability could affect network stability and reliability if exploited, especially in environments where Open5GS is deployed as a core network component.
Potential Impact
For European organizations, especially telecom operators and enterprises deploying private 5G networks using Open5GS, this vulnerability could lead to service interruptions in the AMF component, which is critical for managing user mobility and session contexts. Disruptions could degrade network performance or cause temporary denial of service, impacting end-user connectivity and service availability. While the vulnerability requires local access, compromised internal systems or insider threats could exploit it to destabilize network functions. This could affect critical infrastructure providers, industrial automation relying on 5G, and public safety networks. The impact is primarily on availability and operational continuity rather than data breach or unauthorized access. Given the increasing adoption of Open5GS in private and public 5G deployments across Europe, the vulnerability poses a tangible risk to network reliability and service quality.
Mitigation Recommendations
Organizations should promptly apply the official patch identified by commit 66bc558e417e70ae216ec155e4e81c14ae0ecf30 to all affected Open5GS instances. Beyond patching, it is critical to enforce strict access controls to limit local access to the AMF service hosts, including implementing robust authentication and authorization mechanisms for administrative and operational accounts. Network segmentation should isolate core network components to reduce the risk of local exploitation. Continuous monitoring and logging of AMF service behavior can help detect abnormal assertion failures or crashes indicative of exploitation attempts. Additionally, conducting regular security audits and penetration testing focusing on local privilege escalation and insider threat vectors will help identify and remediate potential attack paths. Organizations should also maintain up-to-date incident response plans tailored to 5G core network disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-07T10:49:59.274Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689510f0ad5a09ad00fcd0df
Added to database: 8/7/2025, 8:47:44 PM
Last enriched: 8/15/2025, 1:13:41 AM
Last updated: 8/15/2025, 1:28:17 AM
Views: 10
Related Threats
CVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.