CVE-2025-15419

A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing a manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue.
References
Link Resource
https://github.com/open5gs/open5gs/commit/5aaa09907e7b9e0a326265a5f08d56f54280b5f2 Patch
https://github.com/open5gs/open5gs/issues/4224 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4224#issue-3766767406 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 Issue Tracking Exploit Vendor Advisory
https://vuldb.com/?ctiid.339341 Permissions Required VDB Entry
https://vuldb.com/?id.339341 Third Party Advisory VDB Entry
https://vuldb.com/?submit.728044 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

06 Jan 2026, 15:04

Type Values Removed Values Added
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
First Time Open5gs open5gs
Open5gs
References () https://github.com/open5gs/open5gs/commit/5aaa09907e7b9e0a326265a5f08d56f54280b5f2 - () https://github.com/open5gs/open5gs/commit/5aaa09907e7b9e0a326265a5f08d56f54280b5f2 - Patch
References () https://github.com/open5gs/open5gs/issues/4224 - () https://github.com/open5gs/open5gs/issues/4224 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4224#issue-3766767406 - () https://github.com/open5gs/open5gs/issues/4224#issue-3766767406 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 - () https://github.com/open5gs/open5gs/issues/4224#issuecomment-3698521008 - Issue Tracking, Exploit, Vendor Advisory
References () https://vuldb.com/?ctiid.339341 - () https://vuldb.com/?ctiid.339341 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.339341 - () https://vuldb.com/?id.339341 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.728044 - () https://vuldb.com/?submit.728044 - Third Party Advisory, VDB Entry

05 Jan 2026, 06:16

Type Values Removed Values Added
Summary (en) A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue. (en) A weakness has been identified in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c of the component GTPv2-C Flow Handler. Executing a manipulation can lead to denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. This patch is called 5aaa09907e7b9e0a326265a5f08d56f54280b5f2. It is advisable to implement a patch to correct this issue.

02 Jan 2026, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-02 01:15

Updated : 2026-01-06 15:04


NVD link : CVE-2025-15419

Mitre link : CVE-2025-15419

CVE.ORG link : CVE-2025-15419


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release