Description
A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.
Problem types
Timeline
| 2025-12-28: | Advisory disclosed |
| 2025-12-28: | VulDB entry created |
| 2025-12-28: | VulDB entry last update |
Credits
ZiyuLin (VulDB User)
References
vuldb.com/?id.338561 (VDB-338561 | Open5GS PFCP Session Establishment Request rule-match.c ogs_pfcp_pdr_rule_find_by_packet assertion)
vuldb.com/?ctiid.338561 (VDB-338561 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.719830 (Submit #719830 | Open5GS v2.7.5 Reachable Assertion)
github.com/open5gs/open5gs/issues/4180
github.com/open5gs/open5gs/issues/4180
github.com/open5gs/open5gs/issues/4180
github.com/...ommit/b72d8349980076e2c033c8324f07747a86eea4f8
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.