A vulnerability was found in Open5GS up to 2.7.5. Affected by this vulnerability is the function ngap_build_downlink_nas_transport of the component AMF. The manipulation leads to reachable assertion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The identifier of the patch is bca0a7b6e01d254f4223b83831162566d4626428. It is recommended to upgrade the affected component.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://vuldb.com/?id.319333 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.319333 | vdb entry permissions required signature |
https://vuldb.com/?submit.626124 | third party advisory vdb entry |
https://vuldb.com/?submit.625698 | third party advisory |
https://github.com/open5gs/open5gs/issues/3950 | issue tracking |
https://github.com/open5gs/open5gs/issues/3950#issuecomment-3034693457 | issue tracking |
https://github.com/user-attachments/files/21030801/newdata_for_ngap.zip | exploit |
https://github.com/open5gs/open5gs/commit/bca0a7b6e01d254f4223b83831162566d4626428 | patch |
https://github.com/open5gs/open5gs/releases/tag/v2.7.6 | release notes patch |
https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8804 | related |