A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function ogs_gtp2_parse_bearer_qos in the library lib/gtp/v2/types.c of the component Bearer QoS IE Length Handler. Performing manipulation results in denial of service. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is named 4e913d21f2c032b187815f063dbab5ebe65fe83a. To fix this issue, it is recommended to deploy a patch.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/commit/4e913d21f2c032b187815f063dbab5ebe65fe83a | Patch |
| https://github.com/open5gs/open5gs/issues/4217 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issue-3759615968 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issuecomment-3690767105 | Issue Tracking Exploit Vendor Advisory |
| https://vuldb.com/?ctiid.339340 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339340 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.728043 | Third Party Advisory VDB Entry |
| https://github.com/open5gs/open5gs/issues/4217 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issue-3759615968 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issuecomment-3690767105 | Issue Tracking Exploit Vendor Advisory |
Configurations
History
06 Jan 2026, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/open5gs/open5gs/commit/4e913d21f2c032b187815f063dbab5ebe65fe83a - Patch | |
| References | () https://github.com/open5gs/open5gs/issues/4217 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/open5gs/open5gs/issues/4217#issue-3759615968 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/open5gs/open5gs/issues/4217#issuecomment-3690767105 - Issue Tracking, Exploit, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.339340 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.339340 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.728043 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| First Time |
Open5gs open5gs
Open5gs |
05 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/open5gs/open5gs/issues/4217 - | |
| References | () https://github.com/open5gs/open5gs/issues/4217#issue-3759615968 - | |
| References | () https://github.com/open5gs/open5gs/issues/4217#issuecomment-3690767105 - |
02 Jan 2026, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-02 00:15
Updated : 2026-01-06 15:06
NVD link : CVE-2025-15418
Mitre link : CVE-2025-15418
CVE.ORG link : CVE-2025-15418
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-404
Improper Resource Shutdown or Release
