A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing a manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/commit/5aaa09907e7b9e0a326265a5f08d56f54280b5f2 | Patch |
| https://github.com/open5gs/open5gs/issues/4224 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4224#issue-3766767406 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 | Issue Tracking Exploit Vendor Advisory |
| https://vuldb.com/?ctiid.339341 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339341 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.728044 | Third Party Advisory VDB Entry |
Configurations
History
06 Jan 2026, 15:04
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| First Time |
Open5gs open5gs
Open5gs |
|
| References | () https://github.com/open5gs/open5gs/commit/5aaa09907e7b9e0a326265a5f08d56f54280b5f2 - Patch | |
| References | () https://github.com/open5gs/open5gs/issues/4224 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/open5gs/open5gs/issues/4224#issue-3766767406 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 - Issue Tracking, Exploit, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.339341 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.339341 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.728044 - Third Party Advisory, VDB Entry |
05 Jan 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing a manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue. |
02 Jan 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-02 01:15
Updated : 2026-01-06 15:04
NVD link : CVE-2025-15419
Mitre link : CVE-2025-15419
CVE.ORG link : CVE-2025-15419
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-404
Improper Resource Shutdown or Release
