Skip to main content

CVE-2025-8698: Reachable Assertion in Open5GS

Medium
VulnerabilityCVE-2025-8698cvecve-2025-8698
Published: Thu Aug 07 2025 (08/07/2025, 20:32:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was found in Open5GS up to 2.7.5. It has been classified as problematic. Affected is the function amf_nsmf_pdusession_handle_release_sm_context of the file src/amf/nsmf-handler.c of the component AMF Service. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The name of the patch is 66bc558e417e70ae216ec155e4e81c14ae0ecf30. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 08/15/2025, 01:13:41 UTC

Technical Analysis

CVE-2025-8698 is a medium severity vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The flaw exists in versions 2.7.0 through 2.7.5 within the AMF (Access and Mobility Management Function) Service component, specifically in the function amf_nsmf_pdusession_handle_release_sm_context located in src/amf/nsmf-handler.c. The vulnerability manifests as a reachable assertion triggered by crafted local input, which can cause the program to abort unexpectedly. This reachable assertion indicates that under certain conditions, the software encounters an assertion failure that is reachable through local manipulation, potentially leading to denial of service or disruption of the affected AMF service. Exploitation requires local access with low privileges (PR:L) and no user interaction, making it somewhat less accessible remotely but still a concern for insiders or compromised local accounts. The vulnerability does not impact confidentiality, integrity, or availability directly beyond causing service disruption. The CVSS 4.0 base score is 4.8 (medium), reflecting the limited scope and local attack vector. A patch identified by commit 66bc558e417e70ae216ec155e4e81c14ae0ecf30 has been released to address this issue. No known exploits are currently observed in the wild, but public disclosure means attackers could develop exploits. Given Open5GS's role in 5G core networks, this vulnerability could affect network stability and reliability if exploited, especially in environments where Open5GS is deployed as a core network component.

Potential Impact

For European organizations, especially telecom operators and enterprises deploying private 5G networks using Open5GS, this vulnerability could lead to service interruptions in the AMF component, which is critical for managing user mobility and session contexts. Disruptions could degrade network performance or cause temporary denial of service, impacting end-user connectivity and service availability. While the vulnerability requires local access, compromised internal systems or insider threats could exploit it to destabilize network functions. This could affect critical infrastructure providers, industrial automation relying on 5G, and public safety networks. The impact is primarily on availability and operational continuity rather than data breach or unauthorized access. Given the increasing adoption of Open5GS in private and public 5G deployments across Europe, the vulnerability poses a tangible risk to network reliability and service quality.

Mitigation Recommendations

Organizations should promptly apply the official patch identified by commit 66bc558e417e70ae216ec155e4e81c14ae0ecf30 to all affected Open5GS instances. Beyond patching, it is critical to enforce strict access controls to limit local access to the AMF service hosts, including implementing robust authentication and authorization mechanisms for administrative and operational accounts. Network segmentation should isolate core network components to reduce the risk of local exploitation. Continuous monitoring and logging of AMF service behavior can help detect abnormal assertion failures or crashes indicative of exploitation attempts. Additionally, conducting regular security audits and penetration testing focusing on local privilege escalation and insider threat vectors will help identify and remediate potential attack paths. Organizations should also maintain up-to-date incident response plans tailored to 5G core network disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-07T10:49:59.274Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689510f0ad5a09ad00fcd0df

Added to database: 8/7/2025, 8:47:44 PM

Last enriched: 8/15/2025, 1:13:41 AM

Last updated: 8/15/2025, 1:28:17 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats