| Titel | Open5GS <=2.7.5 Reachable Assertion |
|---|
| Beschreibung | In Open5GS AMF versions ≤ v2.7.5, a critical vulnerability allows attackers to crash the AMF service by sending a SIGTERM signal during its initialization phase (specifically after subscription requests to the NRF are sent but before responses are processed). This disrupts the internal state machine, triggering a fatal assertion failure that forcibly terminates the AMF process. Exploiting this flaw causes persistent denial-of-service (DoS) attacks, paralyzing 5G core network services and preventing gNodeBs and UEs from establishing connections. |
|---|
| Quelle | ⚠️ https://github.com/open5gs/open5gs/issues/3938 / https://github.com/open5gs/open5gs/commit/53e9e059ed96b940f7ddcd9a2b68cb512524d5db |
|---|
| Benutzer | SQ0409 (UID 85579) |
|---|
| Einreichung | 27.06.2025 15:18 (vor 9 Monaten) |
|---|
| Moderieren | 01.07.2025 07:51 (4 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 314489 [Open5GS bis 2.7.5 AMF Service src/amf/amf-sm.c amf_state_operational Denial of Service] |
|---|
| Punkte | 20 |
|---|