A vulnerability was found in Open5GS up to 2.7.3. It has been classified as problematic. Affected is the function gmm_state_authentication/emm_state_authentication of the component AMF/MME. The manipulation leads to reachable assertion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 9f5d133657850e6167231527514ee1364d37a884. It is recommended to apply a patch to fix this issue. This is a different issue than CVE-2025-1893.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://vuldb.com/?id.310956 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.310956 | vdb entry permissions required signature |
https://vuldb.com/?submit.582269 | vdb entry third party advisory |
https://github.com/open5gs/open5gs/issues/3910 | exploit issue tracking |
https://github.com/open5gs/open5gs/issues/3910#issuecomment-2926719317 | exploit issue tracking |
https://github.com/user-attachments/files/20362243/Problematic.handover.required.process.zip | exploit |
https://github.com/open5gs/open5gs/commit/9f5d133657850e6167231527514ee1364d37a884 | patch |