Open5GS 直到 2.7.5 PFCP Session Establishment Request lib/pfcp/rule-match.c 拒绝服务

CVSS 元临时分数当前攻击价格 (≈)CTI兴趣分数
5.9$0-$5k0.15

摘要信息

Open5GS 直到 2.7.5中曾发现一漏洞,此漏洞被分类为棘手。 受影响的是功能decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet文件:lib/pfcp/rule-match.c的组件:PFCP Session Establishment Request Handler。 由于被操作,进而引发 拒绝服务。 该漏洞被处理的名称为CVE-2025-15176, 攻击可能起始于远程, 另外,有可用的漏洞利用。 推荐安装补丁来解决该问题。

细节信息

Open5GS 直到 2.7.5中曾发现一漏洞,此漏洞被分类为棘手。 受影响的是功能decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet文件:lib/pfcp/rule-match.c的组件:PFCP Session Establishment Request Handler。 由于被操作,进而引发 拒绝服务。 使用 CWE 声明该问题会导致 CWE-617。 此安全漏洞在 以4180编号公开发布。 索取公告的网址是github.com

该漏洞被处理的名称为CVE-2025-15176, 攻击可能起始于远程, 技术详情可用。 此漏洞的受欢迎程度低于平均值。 另外,有可用的漏洞利用。 该漏洞的利用方式已向公众披露,存在被利用的风险。 目前漏洞的结构决定了可能的价格范围为美元价USD $0-$5k。

如果有长度,则声明为 概念验证。 以下网址提供该漏洞利用:github.com

补丁的名称是b72d8349980076e2c033c8324f07747a86eea4f8。 该漏洞修复程序已可在github.com下载。 推荐安装补丁来解决该问题。

产品信息

名称

版本

许可证

网站

CPE 2.3信息

CPE 2.2信息

CVSSv4信息

VulDB 向量: 🔒
VulDB 可靠性: 🔍

CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA 向量: 🔒

CVSSv3信息

VulDB 元基础分数: 6.0
VulDB 元临时分数: 5.9

VulDB 基本分数: 5.3
VulDB 临时得分: 4.8
VulDB 向量: 🔒
VulDB 可靠性: 🔍

NVD 基本分数: 7.5
NVD 向量: 🔒

CNA 基本分数: 5.3
CNA 向量: 🔒

CVSSv2信息

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
向量复杂性身份验证保密完整性可用性
开锁开锁开锁开锁开锁开锁
开锁开锁开锁开锁开锁开锁
开锁开锁开锁开锁开锁开锁

VulDB 基本分数: 🔒
VulDB 临时得分: 🔒
VulDB 可靠性: 🔍

利用信息

分类: 拒绝服务
CWE: CWE-617
CAPEC: 🔒
ATT&CK: 🔒

身体的: 否
本地: 否
远程: 是

可用性: 🔒
访问: 公共
状态: 概念验证
下载: 🔒

EPSS Score: 🔒
EPSS Percentile: 🔒

价格预测: 🔍
当前价格估算: 🔒

0-Day开锁开锁开锁开锁
今天开锁开锁开锁开锁

威胁情报信息

利益: 🔍
活跃演员: 🔍
活跃的APT团体: 🔍

对策信息

建议: 补丁
状态: 🔍

0天时间: 🔒

补丁: b72d8349980076e2c033c8324f07747a86eea4f8

时间轴信息

2025-12-28 公告已发布
2025-12-28 +0 日 已创建 VulDB 条目
2026-01-01 +4 日 VulDB 上次更新

来源信息

产品: github.com

公告: 4180
状态: 已确认
确认: 🔒

CVE: CVE-2025-15176 (🔒)
GCVE (CVE): GCVE-0-2025-15176
GCVE (VulDB): GCVE-100-338561
EUVD: 🔒
scip Labs: https://www.scip.ch/en/?labs.20161013

条目信息

已创建: 2025-12-28 09時30分
已更新: 2026-01-01 06時22分
更改: 2025-12-28 09時30分 (60), 2025-12-28 10時17分 (3), 2025-12-28 10時18分 (12), 2025-12-29 10時33分 (1), 2025-12-29 12時05分 (31), 2026-01-01 06時22分 (11)
完整: 🔍
提交者: ZiyuLin
Cache ID: 216:AE8:103

提交信息

已接受

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

讨论

 ZiyuLin
(+0)
4 月前
Dear VulnDB Team,

I am writing to dispute the current CVSS score of 3.1 assigned to this vulnerability. I strongly believe the score should be 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

My assessment is based on the technical facts of the exploit and consistency with recently scored vulnerabilities of the same nature.

1. Reference to Similar Vulnerability (Precedent) A nearly identical vulnerability, CVE-2025-65559, was recently analyzed by NVD and assigned a score of 7.5.

Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-65559

Comparison: Just like CVE-2025-65559, the vulnerability I reported involves a remote attacker sending a malformed packet to a network service (UPF/Core Network), causing the process to crash immediately. There is no technical justification for scoring my finding (3.1) so drastically lower than its peer (7.5).

2. Technical Justification for Vector Changes

AV: Local (L) -> Network (N): The target service listens on a network interface (e.g., UDP port). The attack is performed remotely by sending packets over the network, identical to the vector in CVE-2025-65559. Local access is NOT required.

PR: Low (L) -> None (N): The crash occurs during the packet parsing stage, prior to any authentication. No credentials are needed to send the UDP packet that triggers the crash.

A: Low (L) -> High (H): The vulnerability causes a fatal crash (Segfault/Panic) of the daemon. The service stops completely and requires a restart. This constitutes a total loss of availability.

I kindly request you to align the scoring of this vulnerability with the established standard for remote DoS vulnerabilities (7.5) to maintain consistency in the database.

Best regards,
Ziyu
Thank you for your feedback. The CVSS scoring of CVE-2025-65559 was made by CISA as an ADP. We have aligned AV and PR but disagree with their impact vector as explained at https://vuldb.com/?kb.cvss

Interested in the pricing of exploits?

See the underground prices here!