Skip to main content

CVE-2025-8803: Denial of Service in Open5GS

Medium
VulnerabilityCVE-2025-8803cvecve-2025-8803
Published: Sun Aug 10 2025 (08/10/2025, 09:32:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability, which was classified as problematic, was found in Open5GS up to 2.7.5. Affected is the function gmm_state_de_registered/gmm_state_exception of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 2.7.6 is able to address this issue. The name of the patch is 1f30edac27f69f61cff50162e980fe58fdeb30ca. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 08/10/2025, 10:02:49 UTC

Technical Analysis

CVE-2025-8803 is a medium severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.5. Open5GS is an open-source implementation of the 5G core network, widely used for research, testing, and in some production environments. The vulnerability resides in the AMF (Access and Mobility Management Function) component, specifically within the gmm_state_de_registered and gmm_state_exception functions in the src/amf/gmm-sm.c source file. These functions handle state transitions related to the GPRS Mobility Management (GMM) protocol, which is critical for managing user equipment registration and mobility in the 5G core network. The flaw allows an unauthenticated remote attacker to manipulate these state functions, leading to a denial of service (DoS) condition. This DoS could disrupt the AMF’s ability to manage user registrations and mobility, potentially causing service interruptions or degraded network performance. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making exploitation feasible remotely. The CVSS 4.0 base score is 6.9, reflecting a medium severity level with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability beyond the DoS impact, and there are no known exploits in the wild at the time of publication. The issue is addressed in Open5GS version 2.7.6, with a patch identified by commit 1f30edac27f69f61cff50162e980fe58fdeb30ca. Upgrading to this version or later is recommended to mitigate the risk.

Potential Impact

For European organizations, especially telecom operators, mobile network infrastructure providers, and enterprises deploying private 5G networks, this vulnerability poses a risk of service disruption. The AMF is a critical 5G core network function responsible for managing user equipment registration and mobility; a DoS attack on this component can result in dropped connections, failed registrations, and degraded network availability. This could impact end-user experience, disrupt business operations relying on 5G connectivity, and potentially affect emergency communications. Given the increasing adoption of 5G networks across Europe for industrial automation, smart cities, and critical infrastructure, any disruption in core network functions can have cascading effects. While no known exploits exist currently, the ease of remote exploitation without authentication increases the risk of opportunistic attacks or targeted disruptions. Organizations operating or testing Open5GS in production or lab environments should consider the threat seriously to avoid unintended service outages or reputational damage.

Mitigation Recommendations

The primary mitigation is to upgrade Open5GS to version 2.7.6 or later, which contains the patch addressing this vulnerability. Organizations should validate their current Open5GS deployments and plan timely updates. In addition to patching, network segmentation and strict access controls should be enforced to limit exposure of the AMF component to untrusted networks. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous traffic targeting GMM state functions can help identify and block exploitation attempts. Monitoring AMF logs for unusual state transitions or error patterns can provide early warning signs of attempted exploitation. For organizations using Open5GS in testing or development environments, isolating these from production networks reduces risk. Finally, maintaining an up-to-date inventory of 5G core network components and applying security best practices for 5G deployments, including secure configuration and regular vulnerability assessments, will further reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T07:37:31.742Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68986ac2ad5a09ad00177d49

Added to database: 8/10/2025, 9:47:46 AM

Last enriched: 8/10/2025, 10:02:49 AM

Last updated: 8/11/2025, 12:33:50 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats