CVE-2025-8805: Denial of Service in Open5GS
A vulnerability was determined in Open5GS up to 2.7.5. Affected by this issue is the function smf_gsm_state_wait_pfcp_deletion of the file src/smf/gsm-sm.c of the component SMF. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The patch is identified as c58b8f081986aaf2a312d73a0a17985518b47fe6. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-8805 is a medium severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.5. Open5GS is an open-source implementation of the 5G core network, widely used for mobile network infrastructure. The vulnerability resides in the SMF (Session Management Function) component, specifically in the function smf_gsm_state_wait_pfcp_deletion within the source file src/smf/gsm-sm.c. An attacker can remotely manipulate this function to trigger a denial of service (DoS) condition. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited over the network, making it relatively easy to exploit. The attack causes the affected SMF component to become unresponsive or crash, disrupting session management in the 5G core network. This disruption can lead to service outages for mobile users relying on the affected infrastructure. The vulnerability has been publicly disclosed along with the exploit details, increasing the risk of exploitation. The issue is addressed in Open5GS version 2.7.6, which includes a patch identified by commit c58b8f081986aaf2a312d73a0a17985518b47fe6. Organizations running vulnerable versions are strongly advised to upgrade to the patched release to mitigate the risk.
Potential Impact
For European organizations, especially telecom operators and service providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a significant risk to network availability and service continuity. A successful DoS attack on the SMF component can disrupt session management, leading to dropped connections, failed session establishments, and degraded user experience for mobile subscribers. This can impact critical communications, emergency services, and enterprise customers relying on 5G connectivity. Additionally, prolonged outages could result in regulatory penalties and reputational damage. Given the increasing adoption of open-source 5G core solutions in Europe to reduce costs and increase flexibility, the exposure surface is notable. The vulnerability's remote exploitability without authentication further elevates the threat, as attackers do not need insider access or complex prerequisites. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact on essential telecom infrastructure is critical.
Mitigation Recommendations
European organizations should immediately assess their Open5GS deployments to identify if versions 2.7.0 through 2.7.5 are in use. The primary mitigation is to upgrade to Open5GS version 2.7.6 or later, which contains the patch for this vulnerability. Network operators should implement strict network segmentation and firewall rules to limit access to the SMF component from untrusted networks, reducing exposure to remote exploitation. Monitoring and anomaly detection systems should be enhanced to detect unusual SMF behavior or service disruptions indicative of exploitation attempts. Additionally, organizations should review and harden their 5G core network configurations, ensuring that management interfaces are not exposed to the public internet. Regular vulnerability scanning and patch management processes must be enforced to promptly address similar vulnerabilities in the future. Finally, incident response plans should be updated to include scenarios involving 5G core DoS attacks to minimize downtime and coordinate rapid recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-8805: Denial of Service in Open5GS
Description
A vulnerability was determined in Open5GS up to 2.7.5. Affected by this issue is the function smf_gsm_state_wait_pfcp_deletion of the file src/smf/gsm-sm.c of the component SMF. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The patch is identified as c58b8f081986aaf2a312d73a0a17985518b47fe6. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-8805 is a medium severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.5. Open5GS is an open-source implementation of the 5G core network, widely used for mobile network infrastructure. The vulnerability resides in the SMF (Session Management Function) component, specifically in the function smf_gsm_state_wait_pfcp_deletion within the source file src/smf/gsm-sm.c. An attacker can remotely manipulate this function to trigger a denial of service (DoS) condition. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited over the network, making it relatively easy to exploit. The attack causes the affected SMF component to become unresponsive or crash, disrupting session management in the 5G core network. This disruption can lead to service outages for mobile users relying on the affected infrastructure. The vulnerability has been publicly disclosed along with the exploit details, increasing the risk of exploitation. The issue is addressed in Open5GS version 2.7.6, which includes a patch identified by commit c58b8f081986aaf2a312d73a0a17985518b47fe6. Organizations running vulnerable versions are strongly advised to upgrade to the patched release to mitigate the risk.
Potential Impact
For European organizations, especially telecom operators and service providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a significant risk to network availability and service continuity. A successful DoS attack on the SMF component can disrupt session management, leading to dropped connections, failed session establishments, and degraded user experience for mobile subscribers. This can impact critical communications, emergency services, and enterprise customers relying on 5G connectivity. Additionally, prolonged outages could result in regulatory penalties and reputational damage. Given the increasing adoption of open-source 5G core solutions in Europe to reduce costs and increase flexibility, the exposure surface is notable. The vulnerability's remote exploitability without authentication further elevates the threat, as attackers do not need insider access or complex prerequisites. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact on essential telecom infrastructure is critical.
Mitigation Recommendations
European organizations should immediately assess their Open5GS deployments to identify if versions 2.7.0 through 2.7.5 are in use. The primary mitigation is to upgrade to Open5GS version 2.7.6 or later, which contains the patch for this vulnerability. Network operators should implement strict network segmentation and firewall rules to limit access to the SMF component from untrusted networks, reducing exposure to remote exploitation. Monitoring and anomaly detection systems should be enhanced to detect unusual SMF behavior or service disruptions indicative of exploitation attempts. Additionally, organizations should review and harden their 5G core network configurations, ensuring that management interfaces are not exposed to the public internet. Regular vulnerability scanning and patch management processes must be enforced to promptly address similar vulnerabilities in the future. Finally, incident response plans should be updated to include scenarios involving 5G core DoS attacks to minimize downtime and coordinate rapid recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-09T07:43:25.628Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689878dcad5a09ad0017b498
Added to database: 8/10/2025, 10:47:56 AM
Last enriched: 8/18/2025, 12:42:34 AM
Last updated: 9/17/2025, 12:51:54 PM
Views: 45
Related Threats
CVE-2025-10775: OS Command Injection in Wavlink WL-NU516U1
MediumCVE-2025-10774: OS Command Injection in Ruijie 6000-E10
MediumCVE-2025-10773: Stack-based Buffer Overflow in B-Link BL-AC2100
HighCVE-2025-10762: SQL Injection in kuaifan DooTask
MediumCVE-2025-10763: Unrestricted Upload in academico-sis academico
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.