Skip to main content

CVE-2025-8805: Denial of Service in Open5GS

Medium
VulnerabilityCVE-2025-8805cvecve-2025-8805
Published: Sun Aug 10 2025 (08/10/2025, 10:32:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was found in Open5GS up to 2.7.5 and classified as problematic. Affected by this issue is the function smf_gsm_state_wait_pfcp_deletion of the file src/smf/gsm-sm.c of the component SMF. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The patch is identified as c58b8f081986aaf2a312d73a0a17985518b47fe6. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 08/10/2025, 11:02:45 UTC

Technical Analysis

CVE-2025-8805 is a denial of service (DoS) vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The vulnerability affects versions 2.7.0 through 2.7.5 of Open5GS, specifically within the SMF (Session Management Function) component. The flaw resides in the function smf_gsm_state_wait_pfcp_deletion located in the source file src/smf/gsm-sm.c. The vulnerability allows an unauthenticated remote attacker to manipulate the state handling logic of the SMF, causing the system to enter a denial of service condition. This could disrupt the normal operation of the 5G core network by preventing proper session management and resource cleanup, potentially leading to service outages or degraded network performance. The vulnerability does not require any privileges or user interaction to exploit, and the attack vector is network-based, making it accessible remotely. The CVSS v4.0 base score is 6.9, indicating a medium severity level. The vendor has addressed the issue in Open5GS version 2.7.6, and the patch is identified by commit c58b8f081986aaf2a312d73a0a17985518b47fe6. No known exploits are currently observed in the wild, but the public disclosure of the vulnerability increases the risk of exploitation attempts. Given Open5GS's role in 5G core networks, this vulnerability could impact the availability of critical telecommunications infrastructure if left unpatched.

Potential Impact

For European organizations, especially telecom operators and service providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a risk to network availability and service continuity. A successful DoS attack could disrupt subscriber session management, leading to dropped connections, inability to establish new sessions, or degraded network performance. This can affect end-user experience and potentially impact critical services relying on 5G connectivity, including IoT deployments, emergency services, and enterprise communications. The disruption could also have regulatory and reputational consequences for operators under stringent European data and service availability regulations. Furthermore, as 5G networks are foundational to digital transformation and smart city initiatives across Europe, any instability could have cascading effects on dependent sectors. Although no active exploits are currently reported, the public disclosure and medium severity rating necessitate prompt remediation to mitigate potential service interruptions.

Mitigation Recommendations

European organizations using Open5GS should prioritize upgrading affected instances to version 2.7.6 or later, which contains the official patch addressing this vulnerability. Network administrators should verify the version of Open5GS deployed and schedule immediate updates to minimize exposure. Additionally, implementing network-level protections such as rate limiting and anomaly detection on PFCP (Packet Forwarding Control Protocol) traffic can help detect and mitigate abnormal state manipulation attempts. Monitoring SMF logs for unusual state transitions or error conditions related to pfcp deletion can provide early warning signs of exploitation attempts. Segmentation of the 5G core network and restricting access to management interfaces can reduce the attack surface. Finally, maintaining an incident response plan tailored to 5G core network disruptions will enable rapid recovery in case of an attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T07:43:25.628Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689878dcad5a09ad0017b498

Added to database: 8/10/2025, 10:47:56 AM

Last enriched: 8/10/2025, 11:02:45 AM

Last updated: 8/11/2025, 12:33:50 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats