A security flaw has been discovered in Open5GS up to 2.7.5. The impacted element is the function gmm_state_exception of the file src/amf/gmm-sm.c. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The patch is identified as 8e5fed16114f2f5e40bee1b161914b592b2b7b8f. Applying a patch is advised to resolve this issue.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://vuldb.com/?id.321241 | technical description vdb entry |
https://vuldb.com/?ctiid.321241 | signature permissions required |
https://vuldb.com/?submit.633467 | third party advisory |
https://github.com/open5gs/open5gs/issues/3947 | issue tracking |
https://github.com/open5gs/open5gs/issues/3947#issuecomment-3029992728 | issue tracking |
https://github.com/user-attachments/files/21013084/amf_udm-uecm.zip | exploit |
https://github.com/open5gs/open5gs/commit/8e5fed16114f2f5e40bee1b161914b592b2b7b8f | patch |