CVE-2025-15555

Open5GS · Open5GS

Open5GS, an open-source implementation for 5G Core and EPC, is affected by a security flaw in versions up to 2. This vulnerability may impact mobile core network stability.

Executive summary

Open5GS versions up to 2.x are affected by a high-severity security flaw that could jeopardize the availability and integrity of 5G core network functions.

Vulnerability

The vulnerability exists within the core processing logic of Open5GS. While specific technical details are limited, it involves a flaw that can be triggered by a network-based attacker, potentially without prior authentication depending on the specific network function targeted.

Business impact

As Open5GS is utilized in private 5G deployments and research environments, an exploit could lead to a total denial of service for mobile communications. The CVSS score of 7.3 reflects a high impact on availability, which can cause significant operational downtime and disrupt critical communication infrastructure.

Remediation

Immediate Action: Administrators should upgrade Open5GS to the latest stable version (3.x or higher) where this flaw has been addressed.

Proactive Monitoring: Implement deep packet inspection (DPI) on S1AP and NGAP interfaces to detect malformed signaling traffic targeting the core.

Compensating Controls: Restrict access to the Open5GS control plane interfaces to trusted management networks only using IPsec or strict firewalling.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the role of Open5GS in critical telecommunications infrastructure, this high-severity flaw must be addressed with urgency. Organizations should prioritize the migration to a patched version to ensure the continued reliability of their mobile network cores.