CVE-2025-15555

A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function hss_ogs_diam_cx_mar_cb of the file src/hss/hss-cx-path.c of the component VoLTE Cx-Test. The manipulation of the argument OGS_KEY_LEN results in stack-based buffer overflow. The attack may be launched remotely. The patch is identified as 54dda041211098730221d0ae20a2f9f9173e7a21. A patch should be applied to remediate this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

07 Apr 2026, 16:16

Type Values Removed Values Added
Summary
  • (es) Una falla de seguridad ha sido descubierta en Open5GS hasta la versión 2.7.6. Afectada por esta vulnerabilidad es la función hss_ogs_diam_cx_mar_cb del archivo src/hss/hss-cx-path.c del componente VoLTE Cx-Test. La manipulación del argumento OGS_KEY_LEN resulta en desbordamiento de búfer basado en pila. El ataque puede ser lanzado remotamente. El parche se identifica como 54dda041211098730221d0ae20a2f9f9173e7a21. Un parche debería aplicarse para remediar este problema.
References
  • {'url': 'https://vuldb.com/?ctiid.343795', 'tags': ['Permissions Required', 'VDB Entry'], 'source': 'cna@vuldb.com'}
  • {'url': 'https://vuldb.com/?id.343795', 'tags': ['Third Party Advisory', 'VDB Entry'], 'source': 'cna@vuldb.com'}
  • {'url': 'https://vuldb.com/?submit.741901', 'tags': ['Third Party Advisory', 'VDB Entry'], 'source': 'cna@vuldb.com'}
  • () https://vuldb.com/submit/741901 -
  • () https://vuldb.com/vuln/343795 -
  • () https://vuldb.com/vuln/343795/cti -

11 Feb 2026, 19:20

Type Values Removed Values Added
References () https://github.com/open5gs/open5gs/ - () https://github.com/open5gs/open5gs/ - Product
References () https://github.com/open5gs/open5gs/commit/54dda041211098730221d0ae20a2f9f9173e7a21 - () https://github.com/open5gs/open5gs/commit/54dda041211098730221d0ae20a2f9f9173e7a21 - Patch
References () https://github.com/open5gs/open5gs/issues/4177 - () https://github.com/open5gs/open5gs/issues/4177 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/open5gs/open5gs/issues/4177#event-21256395700 - () https://github.com/open5gs/open5gs/issues/4177#event-21256395700 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.343795 - () https://vuldb.com/?ctiid.343795 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.343795 - () https://vuldb.com/?id.343795 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.741901 - () https://vuldb.com/?submit.741901 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
First Time Open5gs open5gs
Open5gs
CWE CWE-787

05 Feb 2026, 21:15

Type Values Removed Values Added
References () https://github.com/open5gs/open5gs/issues/4177#event-21256395700 - () https://github.com/open5gs/open5gs/issues/4177#event-21256395700 -

04 Feb 2026, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 21:15

Updated : 2026-04-07 16:16


NVD link : CVE-2025-15555

Mitre link : CVE-2025-15555

CVE.ORG link : CVE-2025-15555


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write