CVE-2025-8802

A vulnerability was determined in Open5GS up to 2.7.5. This vulnerability affects the function smf_state_operational of the file src/smf/smf-sm.c of the component SMF. The manipulation of the argument stream leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version v2.7.6 is able to address this issue. The patch is identified as f168f7586a4fa536cee95ae60ac437d997f15b97. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

15 Aug 2025, 14:15

Type Values Removed Values Added
References
  • () https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8802 -
Summary (en) A vulnerability classified as problematic was found in Open5GS up to 2.7.5. This vulnerability affects the function smf_state_operational of the file src/smf/smf-sm.c of the component SMF. The manipulation of the argument stream leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version v2.7.6 is able to address this issue. The patch is identified as f168f7586a4fa536cee95ae60ac437d997f15b97. It is recommended to upgrade the affected component. (en) A vulnerability was determined in Open5GS up to 2.7.5. This vulnerability affects the function smf_state_operational of the file src/smf/smf-sm.c of the component SMF. The manipulation of the argument stream leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version v2.7.6 is able to address this issue. The patch is identified as f168f7586a4fa536cee95ae60ac437d997f15b97. It is recommended to upgrade the affected component.

13 Aug 2025, 14:30

Type Values Removed Values Added
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
References () https://github.com/open5gs/open5gs/commit/f168f7586a4fa536cee95ae60ac437d997f15b97 - () https://github.com/open5gs/open5gs/commit/f168f7586a4fa536cee95ae60ac437d997f15b97 - Patch
References () https://github.com/open5gs/open5gs/issues/3978 - () https://github.com/open5gs/open5gs/issues/3978 - Issue Tracking
References () https://github.com/open5gs/open5gs/releases/tag/v2.7.6 - () https://github.com/open5gs/open5gs/releases/tag/v2.7.6 - Release Notes
References () https://github.com/user-attachments/files/21104269/5G_SMF.AMF_crash.zip - () https://github.com/user-attachments/files/21104269/5G_SMF.AMF_crash.zip - Exploit
References () https://vuldb.com/?ctiid.319330 - () https://vuldb.com/?ctiid.319330 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.319330 - () https://vuldb.com/?id.319330 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.626122 - () https://vuldb.com/?submit.626122 - Third Party Advisory, VDB Entry
First Time Open5gs open5gs
Open5gs

12 Aug 2025, 16:15

Type Values Removed Values Added
References () https://github.com/open5gs/open5gs/issues/3978 - () https://github.com/open5gs/open5gs/issues/3978 -

11 Aug 2025, 18:32

Type Values Removed Values Added
Summary
  • (es) Se detectó una vulnerabilidad clasificada como problemática en Open5GS hasta la versión 2.7.5. Esta vulnerabilidad afecta la función smf_state_operational del archivo src/smf/smf-sm.c del componente SMF. La manipulación del flujo de argumentos provoca una denegación de servicio. El ataque puede iniciarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Actualizar a la versión 2.7.6 puede solucionar este problema. El parche se identifica como f168f7586a4fa536cee95ae60ac437d997f15b97. Se recomienda actualizar el componente afectado.

10 Aug 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-10 09:15

Updated : 2025-08-15 14:15


NVD link : CVE-2025-8802

Mitre link : CVE-2025-8802

CVE.ORG link : CVE-2025-8802


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release