Open5GS, Denial of Service, CVE-2025-1925 (Medium)

Listen to this Post

How the CVE Works

The vulnerability in Open5GS (up to v2.7.2) resides in the `amf_nsmf_pdusession_handle_update_sm_context` function within src/amf/nsmf-handler.c. A remote attacker can exploit this flaw by sending a maliciously crafted PDU session update request to the AMF (Access and Mobility Management Function). This triggers a NULL pointer dereference or infinite loop, crashing the AMF process. As the AMF is critical for mobility and session management, its failure disrupts all connected UEs (User Equipment), blocking new registrations until manual restart. The attack requires no authentication and can be executed via standard 5G signaling interfaces (e.g., N11/Namf).

DailyCVE Form

Platform: Open5GS
Version: ≤ 2.7.2
Vulnerability: AMF DoS
Severity: Medium
Date: 06/23/2025

Prediction: Patch by 08/2025

What Undercode Say

Analytics:

grep -r "amf_nsmf_pdusession_handle_update_sm_context" src/amf/
curl -X POST "amf.example.org/nsmf-pdu-session-update" --data malicious_payload

Exploit:

  • Crafted PDU session update request.
  • No auth required.
  • Triggers AMF crash.

Protection from this CVE:

  • Patch to v2.7.3+.
  • AMF process isolation.
  • Rate-limit N11/Namf traffic.

Impact:

  • Network-wide outage.
  • UE connectivity loss.
  • Service disruption.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top