A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function ogs_gtp2_parse_bearer_qos in the library lib/gtp/v2/types.c of the component Bearer QoS IE Length Handler. Performing manipulation results in denial of service. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is named 4e913d21f2c032b187815f063dbab5ebe65fe83a. To fix this issue, it is recommended to deploy a patch.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/commit/4e913d21f2c032b187815f063dbab5ebe65fe83a | Patch |
| https://github.com/open5gs/open5gs/issues/4217 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issue-3759615968 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issuecomment-3690767105 | Issue Tracking Exploit Vendor Advisory |
| https://vuldb.com/?ctiid.339340 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339340 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.728043 | Third Party Advisory VDB Entry |
| https://github.com/open5gs/open5gs/issues/4217 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issue-3759615968 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4217#issuecomment-3690767105 | Issue Tracking Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-02 00:15
Updated : 2026-01-06 15:06
NVD link : CVE-2025-15418
Mitre link : CVE-2025-15418
CVE.ORG link : CVE-2025-15418
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-404
Improper Resource Shutdown or Release
