A vulnerability was found in Open5GS up to 2.7.2. It has been declared as problematic. Affected by this vulnerability is the function gmm_state_authentication of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. The patch is named e31e9965f00d9c744a7f728497cb4f3e97744ee8. It is recommended to apply a patch to fix this issue.
References
Link | Resource |
---|---|
https://github.com/open5gs/open5gs/commit/e31e9965f00d9c744a7f728497cb4f3e97744ee8 | Patch |
https://github.com/open5gs/open5gs/issues/3707 | Exploit Issue Tracking |
https://github.com/open5gs/open5gs/issues/3707#issue-2833194192 | Exploit Issue Tracking |
https://github.com/open5gs/open5gs/issues/3707#issuecomment-2639620554 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.298411 | Permissions Required |
https://vuldb.com/?id.298411 | Exploit Third Party Advisory |
https://vuldb.com/?submit.505952 | Third Party Advisory |
https://github.com/open5gs/open5gs/issues/3707#issue-2833194192 | Exploit Issue Tracking |
Configurations
History
06 Mar 2025, 12:21
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
First Time |
Open5gs open5gs
Open5gs |
|
References | () https://github.com/open5gs/open5gs/commit/e31e9965f00d9c744a7f728497cb4f3e97744ee8 - Patch | |
References | () https://github.com/open5gs/open5gs/issues/3707 - Exploit, Issue Tracking | |
References | () https://github.com/open5gs/open5gs/issues/3707#issue-2833194192 - Exploit, Issue Tracking | |
References | () https://github.com/open5gs/open5gs/issues/3707#issuecomment-2639620554 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.298411 - Permissions Required | |
References | () https://vuldb.com/?id.298411 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?submit.505952 - Third Party Advisory |
04 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/open5gs/open5gs/issues/3707#issue-2833194192 - |
04 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A vulnerability was found in Open5GS up to 2.7.2. It has been declared as problematic. Affected by this vulnerability is the function gmm_state_authentication of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. The patch is named e31e9965f00d9c744a7f728497cb4f3e97744ee8. It is recommended to apply a patch to fix this issue. |
04 Mar 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-04 01:15
Updated : 2025-03-06 12:21
NVD link : CVE-2025-1893
Mitre link : CVE-2025-1893
CVE.ORG link : CVE-2025-1893
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-404
Improper Resource Shutdown or Release