| Title | Open5GS <=2.7.5 Reachable Assertion |
|---|
| Description | In Open5GS AMF versions ≤ v2.7.5, a critical vulnerability allows attackers to crash the AMF service by sending a SIGTERM signal during its initialization phase (specifically after subscription requests to the NRF are sent but before responses are processed). This disrupts the internal state machine, triggering a fatal assertion failure that forcibly terminates the AMF process. Exploiting this flaw causes persistent denial-of-service (DoS) attacks, paralyzing 5G core network services and preventing gNodeBs and UEs from establishing connections. |
|---|
| Source | ⚠️ https://github.com/open5gs/open5gs/issues/3938 / https://github.com/open5gs/open5gs/commit/53e9e059ed96b940f7ddcd9a2b68cb512524d5db |
|---|
| User | SQ0409 (UID 85579) |
|---|
| Submission | 06/27/2025 15:18 (10 months ago) |
|---|
| Moderation | 07/01/2025 07:51 (4 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 314489 [Open5GS up to 2.7.5 AMF Service src/amf/amf-sm.c amf_state_operational assertion] |
|---|
| Points | 20 |
|---|