5.3 CVE-2025-5935
Enriched by CISA Patch Exploit
A vulnerability was found in Open5GS up to 2.7.3. It has been declared as problematic. Affected by this vulnerability is the function common_register_state of the file src/mme/emm-sm.c of the component AMF/MME. The manipulation of the argument ran_ue_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 62cb99755243c9c38e4c060c5d8d0e158fe8cdd5. It is recommended to apply a patch to fix this issue.
https://nvd.nist.gov/vuln/detail/CVE-2025-5935
Categories
CWE-404 : Improper Resource Shutdown or Release
When a resource is created or allocated, the developer is responsible for properly releasing the resource as well as accounting for all potential paths of expiration or invalidation, such as a set period of time or revocation.
References
cna@vuldb.com Patch Exploit
| https://github.com/open5gs/open5gs/commit/62cb99755243c9c38e4c060c5d8d0e158fe... Patch |
| https://github.com/open5gs/open5gs/issues/3874 Exploit Issue Tracking |
| https://github.com/open5gs/open5gs/issues/3874#issuecomment-2853547622 Issue Tracking |
| https://github.com/user-attachments/files/19863206/Problematic.handover.requi... Not Applicable |
| https://vuldb.com/?ctiid.311713 Permissions Required VDB Entry |
| https://vuldb.com/?id.311713 Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.589354 Third Party Advisory VDB Entry |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| n/a | Open5GS |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | < 2.7.6 | |
REMEDIATION
Patch
| Url |
|---|
| https://github.com/open5gs/open5gs/commit/62cb99755243c9c38e4c060c5d8d0e158fe... |
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| https://github.com/open5gs/open5gs/issues/3874 |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| 125 | Flooding |
Medium |
| 130 | Excessive Allocation |
Medium |
| 131 | Resource Leak Exposure |
Medium |
| 494 | TCP Fragmentation |
|
| 495 | UDP Fragmentation |
|
| 496 | ICMP Fragmentation |
|
| 666 | BlueSmacking |
Medium |
MITRE
Techniques
| id | description |
|---|---|
| T1498.001 | Network Denial of Service: Direct Network Flood |
| T1499 | Endpoint Denial of Service |
| T1499.001 | Endpoint Denial of Service: OS Exhaustion Flood |
| T1499.003 | Endpoint Denial of Service:Application Exhaustion Flood |
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | |
Mitigations
| id | description |
|---|---|
| M1037 | When flood volumes exceed the capacity of the network connection being targeted, it is typically necessary to intercept the incoming traffic upstream to filter out the attack traffic from the legitimate traffic. Such defenses can be provided by the hosting Internet Service Provider (ISP) or by a 3rd party such as a Content Delivery Network (CDN) or providers specializing in DoS mitigations. Depending on flood volume, on-premises filtering may be possible by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. As immediate response may require rapid engagement of 3rd parties, analyze the risk associated to critical resources being affected by Network DoS attacks and create a disaster recovery plan/business continuity plan to respond to incidents. |
| M1037 | Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. To defend against SYN floods, enable SYN Cookies. |
| M1037 | Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. To defend against SYN floods, enable SYN Cookies. |
| M1037 | Leverage services provided by Content Delivery Networks (CDN) or providers specializing in DoS mitigations to filter traffic upstream from services. Filter boundary traffic by blocking source addresses sourcing the attack, blocking ports that are being targeted, or blocking protocols being used for transport. |
| © 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. | |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
