Skip to main content

CVE-2025-8805: Denial of Service in Open5GS

Medium
VulnerabilityCVE-2025-8805cvecve-2025-8805
Published: Sun Aug 10 2025 (08/10/2025, 10:32:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was determined in Open5GS up to 2.7.5. Affected by this issue is the function smf_gsm_state_wait_pfcp_deletion of the file src/smf/gsm-sm.c of the component SMF. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The patch is identified as c58b8f081986aaf2a312d73a0a17985518b47fe6. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 08/18/2025, 00:42:34 UTC

Technical Analysis

CVE-2025-8805 is a medium severity vulnerability affecting Open5GS versions 2.7.0 through 2.7.5. Open5GS is an open-source implementation of the 5G core network, widely used for mobile network infrastructure. The vulnerability resides in the SMF (Session Management Function) component, specifically in the function smf_gsm_state_wait_pfcp_deletion within the source file src/smf/gsm-sm.c. An attacker can remotely manipulate this function to trigger a denial of service (DoS) condition. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited over the network, making it relatively easy to exploit. The attack causes the affected SMF component to become unresponsive or crash, disrupting session management in the 5G core network. This disruption can lead to service outages for mobile users relying on the affected infrastructure. The vulnerability has been publicly disclosed along with the exploit details, increasing the risk of exploitation. The issue is addressed in Open5GS version 2.7.6, which includes a patch identified by commit c58b8f081986aaf2a312d73a0a17985518b47fe6. Organizations running vulnerable versions are strongly advised to upgrade to the patched release to mitigate the risk.

Potential Impact

For European organizations, especially telecom operators and service providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a significant risk to network availability and service continuity. A successful DoS attack on the SMF component can disrupt session management, leading to dropped connections, failed session establishments, and degraded user experience for mobile subscribers. This can impact critical communications, emergency services, and enterprise customers relying on 5G connectivity. Additionally, prolonged outages could result in regulatory penalties and reputational damage. Given the increasing adoption of open-source 5G core solutions in Europe to reduce costs and increase flexibility, the exposure surface is notable. The vulnerability's remote exploitability without authentication further elevates the threat, as attackers do not need insider access or complex prerequisites. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact on essential telecom infrastructure is critical.

Mitigation Recommendations

European organizations should immediately assess their Open5GS deployments to identify if versions 2.7.0 through 2.7.5 are in use. The primary mitigation is to upgrade to Open5GS version 2.7.6 or later, which contains the patch for this vulnerability. Network operators should implement strict network segmentation and firewall rules to limit access to the SMF component from untrusted networks, reducing exposure to remote exploitation. Monitoring and anomaly detection systems should be enhanced to detect unusual SMF behavior or service disruptions indicative of exploitation attempts. Additionally, organizations should review and harden their 5G core network configurations, ensuring that management interfaces are not exposed to the public internet. Regular vulnerability scanning and patch management processes must be enforced to promptly address similar vulnerabilities in the future. Finally, incident response plans should be updated to include scenarios involving 5G core DoS attacks to minimize downtime and coordinate rapid recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T07:43:25.628Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689878dcad5a09ad0017b498

Added to database: 8/10/2025, 10:47:56 AM

Last enriched: 8/18/2025, 12:42:34 AM

Last updated: 9/17/2025, 12:51:54 PM

Views: 45

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats