CVE-2025-15555
Open5GS · Open5GS
Open5GS, an open-source implementation for 5G Core and EPC, is affected by a security flaw in versions up to 2. This vulnerability may impact mobile core network stability.
Executive summary
Open5GS versions up to 2.x are affected by a high-severity security flaw that could jeopardize the availability and integrity of 5G core network functions.
Vulnerability
The vulnerability exists within the core processing logic of Open5GS. While specific technical details are limited, it involves a flaw that can be triggered by a network-based attacker, potentially without prior authentication depending on the specific network function targeted.
Business impact
As Open5GS is utilized in private 5G deployments and research environments, an exploit could lead to a total denial of service for mobile communications. The CVSS score of 7.3 reflects a high impact on availability, which can cause significant operational downtime and disrupt critical communication infrastructure.
Remediation
Immediate Action: Administrators should upgrade Open5GS to the latest stable version (3.x or higher) where this flaw has been addressed.
Proactive Monitoring: Implement deep packet inspection (DPI) on S1AP and NGAP interfaces to detect malformed signaling traffic targeting the core.
Compensating Controls: Restrict access to the Open5GS control plane interfaces to trusted management networks only using IPsec or strict firewalling.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the role of Open5GS in critical telecommunications infrastructure, this high-severity flaw must be addressed with urgency. Organizations should prioritize the migration to a patched version to ensure the continued reliability of their mobile network cores.