CVE-2025-8802: Denial of Service in Open5GS
A vulnerability was determined in Open5GS up to 2.7.5. This vulnerability affects the function smf_state_operational of the file src/smf/smf-sm.c of the component SMF. The manipulation of the argument stream leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version v2.7.6 is able to address this issue. The patch is identified as f168f7586a4fa536cee95ae60ac437d997f15b97. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-8802 is a medium severity vulnerability affecting Open5GS versions up to 2.7.5, specifically in the SMF (Session Management Function) component. The flaw resides in the function smf_state_operational within the source file src/smf/smf-sm.c. The vulnerability is triggered by manipulating the argument 'stream' passed to this function, which leads to a denial of service (DoS) condition. This means an attacker can remotely cause the SMF component to crash or become unresponsive, disrupting session management in the 5G core network. The vulnerability requires no authentication or user interaction and can be exploited over the network, making it relatively easy to trigger. The disclosed exploit allows attackers to interrupt service availability, potentially impacting network operators relying on Open5GS for 5G core network infrastructure. The issue is addressed in Open5GS version 2.7.6, with the patch identified by commit f168f7586a4fa536cee95ae60ac437d997f15b97. The CVSS v4.0 base score is 6.9, reflecting a medium severity rating due to the impact on availability and ease of exploitation without privileges or user interaction. The vulnerability does not affect confidentiality or integrity directly but can cause service outages that degrade network reliability.
Potential Impact
For European organizations, especially telecom operators and service providers deploying Open5GS as part of their 5G core network infrastructure, this vulnerability poses a risk of service disruption. A successful DoS attack against the SMF component can interrupt session management, leading to dropped connections, degraded user experience, and potential revenue loss. Critical infrastructure relying on 5G connectivity, such as emergency services, IoT deployments, and industrial automation, could be adversely affected by outages. Given the increasing adoption of Open5GS in private and public 5G networks across Europe, the vulnerability could impact network availability and trust in service continuity. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, allowing threat actors to target vulnerable networks without prior access. While no known exploits are currently reported in the wild, the public disclosure of the vulnerability and exploit details raises the risk of opportunistic attacks.
Mitigation Recommendations
European organizations should prioritize upgrading Open5GS deployments to version 2.7.6 or later, which contains the official patch for CVE-2025-8802. Network administrators should verify the version of Open5GS in use and apply the patch promptly to eliminate the vulnerability. In parallel, implementing network-level protections such as firewall rules to restrict access to the SMF component from untrusted networks can reduce exposure. Monitoring network traffic for unusual patterns targeting the SMF function may help detect exploitation attempts early. Organizations should also conduct regular security assessments and penetration testing focused on 5G core components to identify and remediate similar vulnerabilities proactively. Employing redundancy and failover mechanisms in the 5G core network can mitigate the impact of potential DoS attacks by maintaining service continuity. Finally, maintaining up-to-date threat intelligence feeds and subscribing to vulnerability advisories will ensure timely awareness of emerging threats and patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-8802: Denial of Service in Open5GS
Description
A vulnerability was determined in Open5GS up to 2.7.5. This vulnerability affects the function smf_state_operational of the file src/smf/smf-sm.c of the component SMF. The manipulation of the argument stream leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version v2.7.6 is able to address this issue. The patch is identified as f168f7586a4fa536cee95ae60ac437d997f15b97. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-8802 is a medium severity vulnerability affecting Open5GS versions up to 2.7.5, specifically in the SMF (Session Management Function) component. The flaw resides in the function smf_state_operational within the source file src/smf/smf-sm.c. The vulnerability is triggered by manipulating the argument 'stream' passed to this function, which leads to a denial of service (DoS) condition. This means an attacker can remotely cause the SMF component to crash or become unresponsive, disrupting session management in the 5G core network. The vulnerability requires no authentication or user interaction and can be exploited over the network, making it relatively easy to trigger. The disclosed exploit allows attackers to interrupt service availability, potentially impacting network operators relying on Open5GS for 5G core network infrastructure. The issue is addressed in Open5GS version 2.7.6, with the patch identified by commit f168f7586a4fa536cee95ae60ac437d997f15b97. The CVSS v4.0 base score is 6.9, reflecting a medium severity rating due to the impact on availability and ease of exploitation without privileges or user interaction. The vulnerability does not affect confidentiality or integrity directly but can cause service outages that degrade network reliability.
Potential Impact
For European organizations, especially telecom operators and service providers deploying Open5GS as part of their 5G core network infrastructure, this vulnerability poses a risk of service disruption. A successful DoS attack against the SMF component can interrupt session management, leading to dropped connections, degraded user experience, and potential revenue loss. Critical infrastructure relying on 5G connectivity, such as emergency services, IoT deployments, and industrial automation, could be adversely affected by outages. Given the increasing adoption of Open5GS in private and public 5G networks across Europe, the vulnerability could impact network availability and trust in service continuity. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, allowing threat actors to target vulnerable networks without prior access. While no known exploits are currently reported in the wild, the public disclosure of the vulnerability and exploit details raises the risk of opportunistic attacks.
Mitigation Recommendations
European organizations should prioritize upgrading Open5GS deployments to version 2.7.6 or later, which contains the official patch for CVE-2025-8802. Network administrators should verify the version of Open5GS in use and apply the patch promptly to eliminate the vulnerability. In parallel, implementing network-level protections such as firewall rules to restrict access to the SMF component from untrusted networks can reduce exposure. Monitoring network traffic for unusual patterns targeting the SMF function may help detect exploitation attempts early. Organizations should also conduct regular security assessments and penetration testing focused on 5G core components to identify and remediate similar vulnerabilities proactively. Employing redundancy and failover mechanisms in the 5G core network can mitigate the impact of potential DoS attacks by maintaining service continuity. Finally, maintaining up-to-date threat intelligence feeds and subscribing to vulnerability advisories will ensure timely awareness of emerging threats and patches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-09T07:21:02.082Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689863b7ad5a09ad00176291
Added to database: 8/10/2025, 9:17:43 AM
Last enriched: 8/18/2025, 12:42:06 AM
Last updated: 9/22/2025, 6:07:55 AM
Views: 41
Related Threats
CVE-2025-57318: n/a
MediumCVE-2025-57320: n/a
HighCVE-2025-57319: n/a
HighCVE-2025-57323: n/a
HighCVE-2025-59827: CWE-862: Missing Authorization in FlagForgeCTF flagForge
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.