We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as problematic was found in Open5GS up to 2.7.3. Affected by this vulnerability is the function ngap_handle_path_switch_request_transfer of the file src/smf/ngap-handler.c of the component NGAP PathSwitchRequest Message Handler. The manipulation leads to reachable assertion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2daa44adab762c47a8cef69cc984946973a845b3. It is recommended to apply a patch to fix this issue.
In Open5GS bis 2.7.3 wurde eine problematische Schwachstelle entdeckt. Es geht um die Funktion ngap_handle_path_switch_request_transfer der Datei src/smf/ngap-handler.c der Komponente NGAP PathSwitchRequest Message Handler. Dank der Manipulation mit unbekannten Daten kann eine reachable assertion-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als 2daa44adab762c47a8cef69cc984946973a845b3 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.
2025-06-03: | Advisory disclosed |
2025-06-03: | VulDB entry created |
2025-06-03: | VulDB entry last update |
SQ0409 (VulDB User)
vuldb.com/?id.310915 (VDB-310915 | Open5GS NGAP PathSwitchRequest Message ngap-handler.c ngap_handle_path_switch_request_transfer assertion)
vuldb.com/?ctiid.310915 (VDB-310915 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.582265 (Submit #582265 | Open5GS <=2.7.3 Reachable Assertion)
github.com/open5gs/open5gs/issues/3909
github.com/open5gs/open5gs/issues/3909
github.com/...0362183/AMF.crash.due.to.pathswitchrequest.zip
github.com/...ommit/2daa44adab762c47a8cef69cc984946973a845b3
Support options