Open5GS har 2.7.5 PFCP Session Establishment Request lib/pfcp/rule-match.c Kari na aiki

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Open5GS har 2.7.5. Tabbas, aikin decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil lib/pfcp/rule-match.c, a cikin sashi PFCP Session Establishment Request Handler. Wuro manipulation ga Kari na aiki. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-617. Lalle, rauni an sanar da shi 12/28/2025 da 4180. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-15176. Ngam yiɗi ka a tuma ndiyam ka nder internet. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. Patch ɗin an san shi da b72d8349980076e2c033c8324f07747a86eea4f8. Gyaran matsalar yana nan a shirye don saukewa a github.com. Ya kamata a yi amfani da patch don magance wannan matsala. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

6 Goyarwa · 118 Datenpunkte

FurɗeGargadi 1/5
12/28/2025 10:17
Gargadi 2/5
12/28/2025 10:18
Gargadi 3/5
12/29/2025 10:33
Gargadi 4/5
12/29/2025 12:05
Gargadi 5/5
01/01/2026 06:22
software_nameOpen5GSOpen5GSOpen5GSOpen5GSOpen5GS
software_version<=2.7.5<=2.7.5<=2.7.5<=2.7.5<=2.7.5
software_componentPFCP Session Establishment Request HandlerPFCP Session Establishment Request HandlerPFCP Session Establishment Request HandlerPFCP Session Establishment Request HandlerPFCP Session Establishment Request Handler
software_filelib/pfcp/rule-match.clib/pfcp/rule-match.clib/pfcp/rule-match.clib/pfcp/rule-match.clib/pfcp/rule-match.c
software_functiondecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet
vulnerability_cweCWE-617CWE-617CWE-617CWE-617CWE-617
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier41804180418041804180
advisory_urlhttps://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180
advisory_confirm_urlhttps://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066
countermeasure_nameKariKariKariKariKari
patch_nameb72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8
countermeasure_patch_urlhttps://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8
source_cveCVE-2025-15176CVE-2025-15176CVE-2025-15176CVE-2025-15176CVE-2025-15176
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSNNNN
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.75.05.05.05.0
cvss2_vuldb_tempscore1.33.93.93.93.9
cvss3_vuldb_basescore3.35.35.35.35.3
cvss3_vuldb_tempscore3.04.84.84.84.8
cvss3_meta_basescore3.35.35.35.36.0
cvss3_meta_tempscore3.04.84.85.05.9
cvss4_vuldb_bscore4.86.96.96.96.9
cvss4_vuldb_btscore1.95.55.55.55.5
advisory_date1766876400 (12/28/2025)1766876400 (12/28/2025)1766876400 (12/28/2025)1766876400 (12/28/2025)1766876400 (12/28/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-205559EUVD-2025-205559EUVD-2025-205559
cvss4_cna_uiNN
cvss4_cna_vcNN
cvss4_cna_viNN
cvss4_cna_vaLL
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore6.96.9
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prNN
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cvss3_cna_basescore5.35.3
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auNN
cvss2_cna_ciNN
cvss2_cna_iiNN
cvss2_cna_aiPP
cvss2_cna_basescore55
cve_nvd_summaryA flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prNN
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss3_nvd_basescore7.5

Want to stay up to date on a daily basis?

Enable the mail alert feature now!