Untriaged
Permalink
CVE-2025-15532
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Open5GS Timer resource consumption
A security flaw has been discovered in Open5GS up to 2.7.5. This issue affects some unknown processing of the component Timer Handler. The manipulation results in resource consumption. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The patch is identified as c7c131f8d2cb1195ada5e0e691b6868ebcd8a845. It is best practice to apply a patch to resolve this issue.
References
-
-
Submit #729354 | Open5GS SGWC v2.7.6 Denial of Service third-party-advisory
-
Submit #729357 | Open5GS SGWC v2.7.6 Denial of Service (Duplicate) third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4220 issue-tracking
-
https://github.com/open5gs/open5gs/issues/4221 issue-tracking
-
-
-
Submit #729354 | Open5GS SGWC v2.7.6 Denial of Service third-party-advisory
-
Submit #729357 | Open5GS SGWC v2.7.6 Denial of Service (Duplicate) third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4220 issue-tracking
-
https://github.com/open5gs/open5gs/issues/4221 issue-tracking
-
Affected products
Open5GS
- ==2.7.4
- ==2.7.1
- ==2.7.3
- ==2.7.2
- ==2.7.5
- ==2.7.0
Package maintainers
-
@Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com>
-
@xddxdd Yuhui Xu <b980120@hotmail.com>