Enviar #626114: Open5GS <= v2.7.5 Denial of Serviceinformación

TítuloOpen5GS <= v2.7.5 Denial of Service
DescripciónA denial of service vulnerability exists in Open5GS AMF (v2.7.5 and earlier), where the AMF process crashes due to an invalid state transition during handling of SM Context Release in the Initial Context Setup phase. This issue occurs when a UE, connecting via gNB (e.g., UERANSIM), initiates a PDU session but then triggers an SM Context Release before the session is fully established. Under certain conditions—such as constrained system memory or aggressive UE connect/disconnect cycles—the AMF reaches a fatal assertion in amf_nsmf_pdusession_handle_release_sm_context, causing the entire AMF process to crash. The code path involved explicitly states it “should not be reached,” indicating a missing state guard in the finite state machine (FSM). Log Excerpt: FATAL: Release SM Context in initial-context-setup FATAL: amf_nsmf_pdusession_handle_release_sm_context: should not be reached. CVSS v4.0 Score: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H — Base Score: 8.8 (High) This vulnerability is remotely exploitable without authentication, has a low attack complexity, and causes high impact on both general availability and core network security functions. While it does not compromise data confidentiality or integrity, it results in a persistent denial of service of the 5G core's AMF function — severely affecting session management, registration, and authentication.
Fuente⚠️ https://github.com/open5gs/open5gs/issues/3946
Usuario
 xiaohan zheng (UID 88539)
Sumisión2025-07-31 07:47 (hace 9 meses)
Moderación2025-08-13 21:04 (14 days later)
EstadoDuplicado
Entrada de VulDB319128 [Open5GS hasta 2.7.5 AMF Service src/amf/nsmf-handler.c amf_nsmf_pdusession_handle_release_sm_context denegación de servicio]
Puntos0

Want to stay up to date on a daily basis?

Enable the mail alert feature now!