Metrics
Affected Vendors & Products
Wed, 31 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| Vendors & Products |
Open5gs
Open5gs open5gs |
Mon, 29 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 29 Dec 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue. | |
| Title | Open5GS PFCP Session Establishment Request rule-match.c ogs_pfcp_pdr_rule_find_by_packet assertion | |
| Weaknesses | CWE-617 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-12-29T06:32:06.957Z
Updated: 2025-12-29T14:38:33.043Z
Reserved: 2025-12-28T08:25:27.283Z
Link: CVE-2025-15176
Updated: 2025-12-29T14:38:30.319Z
Status : Analyzed
Published: 2025-12-29T07:15:54.153
Modified: 2025-12-31T20:57:01.373
Link: CVE-2025-15176
No data.