CVE-2021-25863
📋 TL;DR
Open5GS 2.1.3 has a default admin password and listens on all network interfaces, allowing attackers to gain administrative access to the 5G core network software. This affects all deployments using the default configuration without password changes or network restrictions.
💻 Affected Systems
- Open5GS
📦 What is this software?
Open5gs by Open5gs
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the 5G core network, allowing attacker to intercept/modify traffic, disrupt services, or pivot to other network components.
Likely Case
Unauthorized administrative access leading to configuration changes, service disruption, or data exfiltration.
If Mitigated
No impact if password is changed and network access is properly restricted.
🎯 Exploit Status
Exploitation requires network access to port 3000 and knowledge of default credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.4 or later
Vendor Advisory: https://github.com/open5gs/open5gs/issues/764
Restart Required: Yes
Instructions:
1. Update Open5GS to version 2.1.4 or later. 2. Change default admin password. 3. Restart Open5GS services.
🔧 Temporary Workarounds
Change Admin Password
linuxChange the default admin password from '1423' to a strong, unique password.
# Use Open5GS admin interface or configuration files to change password
Restrict Network Access
linuxConfigure firewall to restrict access to port 3000 to trusted networks only.
sudo iptables -A INPUT -p tcp --dport 3000 -s TRUSTED_NETWORK -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 3000 -j DROP
🧯 If You Can't Patch
- Change default admin password immediately
- Restrict network access to port 3000 using firewall rules
🔍 How to Verify
Check if Vulnerable:
Check if Open5GS is listening on port 3000 and test authentication with default credentials 'admin:1423'.
Check Version:
open5gs --version
Verify Fix Applied:
Verify Open5GS version is 2.1.4+, default password no longer works, and port 3000 access is restricted.
📡 Detection & Monitoring
Log Indicators:
- Failed login attempts on port 3000
- Successful admin logins from unexpected sources
Network Indicators:
- Unauthorized access attempts to port 3000
- Traffic patterns suggesting admin interface compromise
SIEM Query:
source_port:3000 AND (event_type:auth_failed OR event_type:auth_success)