Description
A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing a manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.
Problem types
Timeline
| 2025-12-28: | Advisory disclosed |
| 2025-12-28: | VulDB entry created |
| 2026-01-01: | VulDB entry last update |
Credits
ZiyuLin (VulDB User)
References
vuldb.com/?id.338561 (VDB-338561 | Open5GS PFCP Session Establishment Request rule-match.c ogs_pfcp_pdr_rule_find_by_packet assertion)
vuldb.com/?ctiid.338561 (VDB-338561 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.719830 (Submit #719830 | Open5GS v2.7.5 Reachable Assertion)
github.com/open5gs/open5gs/issues/4180
github.com/open5gs/open5gs/issues/4180
github.com/open5gs/open5gs/issues/4180
github.com/...ommit/b72d8349980076e2c033c8324f07747a86eea4f8
github.com/open5gs/open5gs/