A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing a manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/ | |
| https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8 | Patch |
| https://github.com/open5gs/open5gs/issues/4180 | Exploit Issue Tracking |
| https://github.com/open5gs/open5gs/issues/4180#issue-3666760066 | Exploit Issue Tracking |
| https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.338561 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338561 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.719830 | Exploit Third Party Advisory VDB Entry |
Configurations
History
24 Feb 2026, 07:17
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing a manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue. | |
| References |
|
31 Dec 2025, 20:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8 - Patch | |
| References | () https://github.com/open5gs/open5gs/issues/4180 - Exploit, Issue Tracking | |
| References | () https://github.com/open5gs/open5gs/issues/4180#issue-3666760066 - Exploit, Issue Tracking | |
| References | () https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671 - Exploit, Issue Tracking | |
| References | () https://vuldb.com/?ctiid.338561 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.338561 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.719830 - Exploit, Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| First Time |
Open5gs open5gs
Open5gs |
29 Dec 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-29 07:15
Updated : 2026-02-24 07:17
NVD link : CVE-2025-15176
Mitre link : CVE-2025-15176
CVE.ORG link : CVE-2025-15176
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-617
Reachable Assertion
