A vulnerability was found in Open5GS up to 2.7.5. It has been classified as problematic. Affected is the function amf_nsmf_pdusession_handle_release_sm_context of the file src/amf/nsmf-handler.c of the component AMF Service. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The name of the patch is 66bc558e417e70ae216ec155e4e81c14ae0ecf30. It is recommended to apply a patch to fix this issue.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/commit/66bc558e417e70ae216ec155e4e81c14ae0ecf30 | Product |
| https://github.com/open5gs/open5gs/issues/4012 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/user-attachments/files/21356631/amf_nsmf_pdusession_handle_release_sm_context.zip | Not Applicable |
| https://vuldb.com/?ctiid.319128 | Permissions Required VDB Entry |
| https://vuldb.com/?id.319128 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.621282 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-07 21:15
Updated : 2025-08-25 16:50
NVD link : CVE-2025-8698
Mitre link : CVE-2025-8698
CVE.ORG link : CVE-2025-8698
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-617
Reachable Assertion
