A missing length check in `ogs_pfcp_subnet_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dnn` field with a value with length greater than 101.
References
Link | Resource |
---|---|
https://gist.github.com/scemodicecosa/8643fbfc9490f40e955e9f9e9b0d9077 | Broken Link |
https://gist.github.com/scmdcs/8643fbfc9490f40e955e9f9e9b0d9077 | Exploit Third Party Advisory |
https://github.com/open5gs/open5gs/issues/3775 | Exploit Issue Tracking |
Configurations
History
09 Jul 2025, 18:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/scemodicecosa/8643fbfc9490f40e955e9f9e9b0d9077 - Broken Link | |
References | () https://gist.github.com/scmdcs/8643fbfc9490f40e955e9f9e9b0d9077 - Exploit, Third Party Advisory | |
References | () https://github.com/open5gs/open5gs/issues/3775 - Exploit, Issue Tracking | |
First Time |
Open5gs open5gs
Open5gs |
|
CPE | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* |
20 Jun 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
18 Jun 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
18 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-18 16:15
Updated : 2025-07-09 18:33
NVD link : CVE-2025-44952
Mitre link : CVE-2025-44952
CVE.ORG link : CVE-2025-44952
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')