Open5GS, Reachable Assertion Vulnerability, CVE-2025-5501 (Medium)

Listen to this Post

How the CVE Works

The vulnerability in Open5GS (up to v2.7.3) resides in the NGAP PathSwitchRequest message handler (src/smf/ngap-handler.c). The function `ngap_handle_path_switch_request_transfer` contains a reachable assertion flaw. When processing a maliciously crafted PathSwitchRequest message, an attacker can trigger an assertion failure remotely, leading to a denial of service (DoS) condition. The exploit leverages improper validation in the message handler, allowing an unauthenticated attacker to crash the service via network traffic.

DailyCVE Form

Platform: Open5GS
Version: ≤ 2.7.3
Vulnerability: Reachable assertion
Severity: Medium
Date: 2025-06-03

Prediction: Patch by 2025-07-15

What Undercode Say

git clone https://github.com/open5gs/open5gs
cd open5gs
git checkout 2daa44adab762c47a8cef69cc984946973a845b3 Patch commit

How Exploit

import socket
crafted_packet = b"\x00\x01\x02..." Malicious NGAP PathSwitchRequest
sock.sendto(crafted_packet, ("target_ip", 38412))

Protection from this CVE

  • Apply patch 2daa44adab762c47a8cef69cc984946973a845b3.
  • Update to Open5GS > 2.7.3.
  • Filter untrusted NGAP traffic.

Impact

  • DoS via service crash.
  • Disrupts cellular core network functionality.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top