Skip to main content

CVE-2025-8800: Denial of Service in Open5GS

Medium
VulnerabilityCVE-2025-8800cvecve-2025-8800
Published: Sun Aug 10 2025 (08/10/2025, 08:02:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was found in Open5GS up to 2.7.5. It has been rated as problematic. Affected by this issue is the function esm_handle_pdn_connectivity_request of the file src/mme/esm-handler.c of the component AMF Component. The manipulation leads to denial of service. The attack may be launched remotely. Upgrading to version 2.7.6 is able to address this issue. The name of the patch is 701505102f514cbde2856cd2ebc9bedb7efc820d. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 08/10/2025, 08:32:46 UTC

Technical Analysis

CVE-2025-8800 is a vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The flaw exists in the esm_handle_pdn_connectivity_request function within the Access and Mobility Management Function (AMF) component, specifically in the source file src/mme/esm-handler.c. This vulnerability allows an unauthenticated remote attacker to manipulate the PDN connectivity request handling process, leading to a denial of service (DoS) condition. The DoS impact likely results from improper handling of malformed or maliciously crafted PDN connectivity requests, causing the AMF component to crash or become unresponsive, thereby disrupting the 5G core network services. The vulnerability affects Open5GS versions 2.7.0 through 2.7.5. The issue has been rated with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on availability. The vulnerability does not impact confidentiality or integrity. The vendor has addressed this issue in version 2.7.6, and a patch identified by the commit hash 701505102f514cbde2856cd2ebc9bedb7efc820d is available. No known exploits are currently reported in the wild. Given the critical role of the AMF in managing mobility and session states in 5G networks, exploitation of this vulnerability could disrupt mobile network operations, affecting user connectivity and service availability.

Potential Impact

For European organizations, particularly telecom operators and enterprises deploying private 5G networks using Open5GS, this vulnerability poses a risk of service disruption. A successful DoS attack could lead to temporary loss of connectivity for subscribers, impacting critical communications, IoT services, and enterprise applications reliant on 5G connectivity. This disruption could affect emergency services, industrial automation, and other latency-sensitive applications. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could result in financial losses, reputational damage, and regulatory scrutiny under frameworks such as the NIS Directive. Organizations operating 5G infrastructure must consider the potential for targeted attacks aiming to degrade network performance or availability, especially in high-dependency environments.

Mitigation Recommendations

European organizations should promptly upgrade Open5GS deployments to version 2.7.6 or later to remediate this vulnerability. In addition to patching, network operators should implement strict input validation and anomaly detection mechanisms at the network edge to identify and block malformed PDN connectivity requests. Deploying rate limiting and traffic filtering on interfaces exposed to untrusted networks can reduce the risk of exploitation. Continuous monitoring of AMF component logs and network telemetry for unusual patterns indicative of DoS attempts is recommended. Organizations should also conduct regular security assessments and penetration testing of their 5G core components to identify potential weaknesses. For private 5G deployments, isolating critical network functions and enforcing strong access controls can further mitigate risk. Finally, maintaining an incident response plan tailored to 5G network disruptions will help minimize operational impact in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T05:50:21.629Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689855a7ad5a09ad00137452

Added to database: 8/10/2025, 8:17:43 AM

Last enriched: 8/10/2025, 8:32:46 AM

Last updated: 8/11/2025, 12:33:50 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats