logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2025-1893

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2025-1893

Description:
A vulnerability was found in Open5GS up to 2.7.2. It has been declared as problematic. Affected by this vulnerability is the function gmm_state_authentication of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. The patch is named e31e9965f00d9c744a7f728497cb4f3e97744ee8. It is recommended to apply a patch to fix this issue.
Last updated date:
03/06/2025
Type:
exploit
Confidence:
HIGH
Date of publishing:
03/06/2025
Reference url to background

https://github.com/open5gs/open5gs/issues/3707

Type:
exploit
Confidence:
HIGH
Date of publishing:
03/06/2025
Type:
exploit
Confidence:
HIGH
Date of publishing:
03/06/2025
Type:
exploit
Confidence:
HIGH
Date of publishing:
03/06/2025
Reference url to background

https://vuldb.com/?id.298411

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy