CVE-2025-15419

A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing a manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

23 Feb 2026, 09:16

Type Values Removed Values Added
References
  • () https://github.com/open5gs/open5gs/ -
References () https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 - Issue Tracking, Exploit, Vendor Advisory () https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 - Exploit, Issue Tracking, Vendor Advisory

06 Jan 2026, 15:04

Type Values Removed Values Added
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
First Time Open5gs open5gs
Open5gs
References () https://github.com/open5gs/open5gs/commit/5aaa09907e7b9e0a326265a5f08d56f54280b5f2 - () https://github.com/open5gs/open5gs/commit/5aaa09907e7b9e0a326265a5f08d56f54280b5f2 - Patch
References () https://github.com/open5gs/open5gs/issues/4224 - () https://github.com/open5gs/open5gs/issues/4224 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4224#issue-3766767406 - () https://github.com/open5gs/open5gs/issues/4224#issue-3766767406 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 - () https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 - Issue Tracking, Exploit, Vendor Advisory
References () https://vuldb.com/?ctiid.339341 - () https://vuldb.com/?ctiid.339341 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.339341 - () https://vuldb.com/?id.339341 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.728044 - () https://vuldb.com/?submit.728044 - Third Party Advisory, VDB Entry

05 Jan 2026, 06:16

Type Values Removed Values Added
Summary (en) A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue. (en) A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing a manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue.

02 Jan 2026, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-02 01:15

Updated : 2026-02-23 09:16


NVD link : CVE-2025-15419

Mitre link : CVE-2025-15419

CVE.ORG link : CVE-2025-15419


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release