CVE-2025-8803: Denial of Service in Open5GS
A vulnerability has been found in Open5GS up to 2.7.5. Affected is the function gmm_state_de_registered/gmm_state_exception of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 2.7.6 is able to address this issue. The name of the patch is 1f30edac27f69f61cff50162e980fe58fdeb30ca. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-8803 is a medium-severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.5. Open5GS is an open-source implementation of the 5G core network, widely used for mobile network infrastructure. The vulnerability resides in the AMF (Access and Mobility Management Function) component, specifically within the gmm_state_de_registered and gmm_state_exception functions in the source file src/amf/gmm-sm.c. An attacker can remotely manipulate these functions to trigger a denial of service (DoS) condition, causing the affected AMF component to crash or become unresponsive. This disruption can interrupt the management of user equipment states and mobility, potentially leading to service outages for subscribers relying on the affected 5G core network. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, increasing its risk profile. The issue is addressed in Open5GS version 2.7.6, with a patch identified by commit 1f30edac27f69f61cff50162e980fe58fdeb30ca. No known exploits are currently reported in the wild, but the ease of remote exploitation and the critical role of the AMF in 5G networks make timely patching essential.
Potential Impact
For European organizations, particularly mobile network operators and infrastructure providers deploying Open5GS, this vulnerability poses a significant risk to network availability and service continuity. A successful DoS attack on the AMF could disrupt subscriber authentication, mobility management, and session handling, leading to widespread service degradation or outages. This can affect not only consumer mobile services but also critical sectors relying on 5G connectivity such as healthcare, transportation, and emergency services. The impact extends to enterprises using private 5G networks based on Open5GS, potentially interrupting industrial operations and IoT deployments. Given the increasing adoption of 5G technology across Europe, the vulnerability could have cascading effects on digital services and economic activities dependent on reliable mobile connectivity.
Mitigation Recommendations
European organizations should prioritize upgrading Open5GS deployments to version 2.7.6 or later to remediate this vulnerability. Network operators should implement rigorous patch management processes to ensure timely application of security updates. Additionally, deploying network-level protections such as intrusion detection and prevention systems (IDS/IPS) can help identify and block anomalous traffic patterns targeting the AMF functions. Network segmentation and strict access controls should be enforced to limit exposure of the 5G core components to untrusted networks. Continuous monitoring of AMF logs and performance metrics can aid in early detection of potential exploitation attempts. For organizations running private 5G networks, isolating critical network functions and employing redundancy can reduce the impact of potential DoS attacks. Finally, collaboration with vendors and participation in threat intelligence sharing within the European telecom sector can enhance preparedness against emerging threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-8803: Denial of Service in Open5GS
Description
A vulnerability has been found in Open5GS up to 2.7.5. Affected is the function gmm_state_de_registered/gmm_state_exception of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 2.7.6 is able to address this issue. The name of the patch is 1f30edac27f69f61cff50162e980fe58fdeb30ca. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-8803 is a medium-severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.5. Open5GS is an open-source implementation of the 5G core network, widely used for mobile network infrastructure. The vulnerability resides in the AMF (Access and Mobility Management Function) component, specifically within the gmm_state_de_registered and gmm_state_exception functions in the source file src/amf/gmm-sm.c. An attacker can remotely manipulate these functions to trigger a denial of service (DoS) condition, causing the affected AMF component to crash or become unresponsive. This disruption can interrupt the management of user equipment states and mobility, potentially leading to service outages for subscribers relying on the affected 5G core network. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, increasing its risk profile. The issue is addressed in Open5GS version 2.7.6, with a patch identified by commit 1f30edac27f69f61cff50162e980fe58fdeb30ca. No known exploits are currently reported in the wild, but the ease of remote exploitation and the critical role of the AMF in 5G networks make timely patching essential.
Potential Impact
For European organizations, particularly mobile network operators and infrastructure providers deploying Open5GS, this vulnerability poses a significant risk to network availability and service continuity. A successful DoS attack on the AMF could disrupt subscriber authentication, mobility management, and session handling, leading to widespread service degradation or outages. This can affect not only consumer mobile services but also critical sectors relying on 5G connectivity such as healthcare, transportation, and emergency services. The impact extends to enterprises using private 5G networks based on Open5GS, potentially interrupting industrial operations and IoT deployments. Given the increasing adoption of 5G technology across Europe, the vulnerability could have cascading effects on digital services and economic activities dependent on reliable mobile connectivity.
Mitigation Recommendations
European organizations should prioritize upgrading Open5GS deployments to version 2.7.6 or later to remediate this vulnerability. Network operators should implement rigorous patch management processes to ensure timely application of security updates. Additionally, deploying network-level protections such as intrusion detection and prevention systems (IDS/IPS) can help identify and block anomalous traffic patterns targeting the AMF functions. Network segmentation and strict access controls should be enforced to limit exposure of the 5G core components to untrusted networks. Continuous monitoring of AMF logs and performance metrics can aid in early detection of potential exploitation attempts. For organizations running private 5G networks, isolating critical network functions and employing redundancy can reduce the impact of potential DoS attacks. Finally, collaboration with vendors and participation in threat intelligence sharing within the European telecom sector can enhance preparedness against emerging threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-09T07:37:31.742Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68986ac2ad5a09ad00177d49
Added to database: 8/10/2025, 9:47:46 AM
Last enriched: 8/18/2025, 12:41:01 AM
Last updated: 9/21/2025, 10:19:18 PM
Views: 41
Related Threats
CVE-2025-57318: n/a
MediumCVE-2025-57320: n/a
HighCVE-2025-57319: n/a
HighCVE-2025-57323: n/a
HighCVE-2025-59827: CWE-862: Missing Authorization in FlagForgeCTF flagForge
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.