We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in Open5GS up to 2.7.3. It has been classified as problematic. Affected is the function gmm_state_authentication/emm_state_authentication of the component AMF/MME. The manipulation leads to reachable assertion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 9f5d133657850e6167231527514ee1364d37a884. It is recommended to apply a patch to fix this issue. This is a different issue than CVE-2025-1893.
Es wurde eine problematische Schwachstelle in Open5GS bis 2.7.3 ausgemacht. Hiervon betroffen ist die Funktion gmm_state_authentication/emm_state_authentication der Komponente AMF/MME. Durch Manipulieren mit unbekannten Daten kann eine reachable assertion-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als 9f5d133657850e6167231527514ee1364d37a884 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.
2025-06-03: | Advisory disclosed |
2025-06-03: | VulDB entry created |
2025-06-03: | VulDB entry last update |
SQ0409 (VulDB User)
vuldb.com/?id.310956 (VDB-310956 | Open5GS AMF/MME emm_state_authentication assertion)
vuldb.com/?ctiid.310956 (VDB-310956 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.582269 (Submit #582269 | Open5GS <=2.7.3 Reachable Assertion)
github.com/open5gs/open5gs/issues/3910
github.com/open5gs/open5gs/issues/3910
github.com/...2243/Problematic.handover.required.process.zip
github.com/...ommit/9f5d133657850e6167231527514ee1364d37a884
Support options