Skip to main content

CVE-2025-8799: Denial of Service in Open5GS

Medium
VulnerabilityCVE-2025-8799cvecve-2025-8799
Published: Sun Aug 10 2025 (08/10/2025, 07:32:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was identified in Open5GS up to 2.7.5. Affected by this vulnerability is the function amf_npcf_am_policy_control_build_create/amf_nsmf_pdusession_build_create_sm_context of the file src/amf/npcf-build.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The patch is named cf63dd63197bf61a4b041aa364ba6a6199ab15e4. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 08/18/2025, 00:41:41 UTC

Technical Analysis

CVE-2025-8799 is a denial of service (DoS) vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The vulnerability affects versions 2.7.0 through 2.7.5 of Open5GS and resides in the AMF (Access and Mobility Management Function) component, specifically within the functions amf_npcf_am_policy_control_build_create and amf_nsmf_pdusession_build_create_sm_context located in the source file src/amf/npcf-build.c. These functions are responsible for building policy control and session management contexts. The vulnerability arises from improper handling or manipulation of inputs to these functions, which can be exploited remotely without authentication or user interaction to cause a denial of service condition. This could lead to the AMF component crashing or becoming unresponsive, thereby disrupting the 5G core network services dependent on Open5GS. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its network attack vector, low attack complexity, and no privileges or user interaction required. The scope is limited to availability impact, with no confidentiality or integrity impact. A patch addressing this issue was released in Open5GS version 2.7.6, identified by commit cf63dd63197bf61a4b041aa364ba6a6199ab15e4. Organizations using affected versions are strongly advised to upgrade to this patched version to mitigate the risk. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation attempts.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for telecom operators, infrastructure providers, and enterprises deploying private 5G networks using Open5GS. A successful DoS attack against the AMF component can disrupt critical 5G core network functions such as mobility management and session control, leading to service outages or degraded network performance. This can affect end-user connectivity, IoT device communication, and enterprise applications relying on 5G connectivity. Given the increasing adoption of 5G networks across Europe for smart cities, industrial automation, and critical infrastructure, such disruptions could have cascading effects on business operations and public services. Additionally, the remote and unauthenticated nature of the exploit increases the risk of widespread attacks, potentially impacting multiple operators or service providers simultaneously. While the vulnerability does not compromise data confidentiality or integrity, the availability impact alone can cause significant operational and reputational damage.

Mitigation Recommendations

European organizations should prioritize upgrading Open5GS deployments to version 2.7.6 or later, which contains the official patch for CVE-2025-8799. Network administrators should implement strict network segmentation and firewall rules to limit exposure of the AMF component to untrusted networks, reducing the attack surface. Monitoring and anomaly detection systems should be enhanced to identify unusual traffic patterns or repeated requests targeting the vulnerable functions, enabling early detection of exploitation attempts. Additionally, organizations should conduct regular vulnerability assessments and penetration testing focused on 5G core components to identify and remediate similar issues proactively. For private 5G deployments, consider deploying redundant AMF instances with failover capabilities to minimize service disruption in case of an attack. Finally, maintain close coordination with Open5GS community updates and security advisories to stay informed of any further developments or related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T05:43:59.897Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68984e9fad5a09ad00135897

Added to database: 8/10/2025, 7:47:43 AM

Last enriched: 8/18/2025, 12:41:41 AM

Last updated: 9/22/2025, 3:53:31 AM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats