Skip to main content

CVE-2025-9405: Reachable Assertion in Open5GS

Medium
VulnerabilityCVE-2025-9405cvecve-2025-9405
Published: Mon Aug 25 2025 (08/25/2025, 03:02:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A security flaw has been discovered in Open5GS up to 2.7.5. The impacted element is the function gmm_state_exception of the file src/amf/gmm-sm.c. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The patch is identified as 8e5fed16114f2f5e40bee1b161914b592b2b7b8f. Applying a patch is advised to resolve this issue.

AI-Powered Analysis

AILast updated: 08/25/2025, 03:47:49 UTC

Technical Analysis

CVE-2025-9405 is a security vulnerability identified in Open5GS, an open-source implementation of the 5G core network. The flaw exists in versions up to 2.7.5 within the function gmm_state_exception located in the src/amf/gmm-sm.c source file. This vulnerability manifests as a reachable assertion, which means that under certain conditions, the program encounters an assertion failure that can be triggered remotely without authentication or user interaction. The assertion failure could lead to a denial of service (DoS) by crashing the affected component, specifically the Access and Mobility Management Function (AMF) in the 5G core. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its network attack vector, low attack complexity, and no required privileges or user interaction. The vulnerability does not impact confidentiality, integrity, or availability beyond the potential service disruption caused by the assertion failure. An exploit has been publicly released, increasing the risk of exploitation, although no confirmed widespread exploitation in the wild has been reported yet. A patch identified by commit 8e5fed16114f2f5e40bee1b161914b592b2b7b8f is available and should be applied promptly to remediate the issue. This vulnerability highlights the importance of securing 5G core network components, which are critical infrastructure elements in modern telecommunications.

Potential Impact

For European organizations, particularly telecom operators and service providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a risk of service disruption. Exploitation could cause the AMF component to crash, leading to denial of service for subscribers relying on affected network segments. This could impact network availability, degrade user experience, and potentially disrupt critical communications services. Given the increasing reliance on 5G networks for industrial, governmental, and consumer applications in Europe, such disruptions could have cascading effects on business operations and public safety communications. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact alone is significant for network operators. Additionally, the public availability of an exploit increases the urgency for European entities to address this vulnerability to prevent opportunistic attacks.

Mitigation Recommendations

European organizations should immediately assess their deployment of Open5GS versions 2.7.0 through 2.7.5 and prioritize patching to the fixed version incorporating commit 8e5fed16114f2f5e40bee1b161914b592b2b7b8f. Network operators should implement strict network segmentation and firewall rules to limit exposure of the AMF interfaces to untrusted networks, reducing the attack surface. Continuous monitoring of AMF logs and system health metrics can help detect abnormal crashes or assertion failures indicative of exploitation attempts. Employing redundancy and failover mechanisms in the 5G core can mitigate service disruption impact. Additionally, organizations should stay informed on threat intelligence updates regarding exploitation trends and consider deploying intrusion detection systems tuned for Open5GS-specific anomalies. Finally, conducting regular security audits and code reviews of open-source network components can help identify and remediate vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-24T15:08:33.518Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68abd958ad5a09ad0047beb4

Added to database: 8/25/2025, 3:32:40 AM

Last enriched: 8/25/2025, 3:47:49 AM

Last updated: 8/26/2025, 12:34:54 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats