CVE-2025-14953

3.1 LOW

📋 TL;DR

A null pointer dereference vulnerability in Open5GS's PFCP handler allows remote attackers to cause denial of service by crashing the service. This affects Open5GS deployments up to version 2.7.5 that handle PFCP protocol traffic. The vulnerability is in the FAR-ID handler component and requires specific network manipulation to exploit.

💻 Affected Systems

Products:
  • Open5GS
Versions: Up to and including 2.7.5
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using PFCP protocol handling; requires FAR-ID handler component to be active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker causes service disruption through denial of service, potentially affecting 5G network functionality for connected devices.

🟠

Likely Case

Service crash requiring restart, causing temporary service interruption for affected network functions.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring; service automatically restarts with minimal downtime.

🌐 Internet-Facing: MEDIUM - Attack requires remote access but exploitation complexity is high and specific network conditions needed.
🏢 Internal Only: MEDIUM - Internal attackers with network access could exploit, but still requires high complexity and specific conditions.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploit requires specific PFCP protocol manipulation; published exploit details exist but require technical expertise to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 93a9fd98a8baa94289be3b982028201de4534e32 and later

Vendor Advisory: https://github.com/open5gs/open5gs/commit/93a9fd98a8baa94289be3b982028201de4534e32

Restart Required: Yes

Instructions:

1. Update Open5GS to latest version or apply specific commit 2. Rebuild from source if using custom build 3. Restart Open5GS services

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict PFCP protocol access to trusted network segments only

iptables -A INPUT -p udp --dport 8805 -s trusted_network -j ACCEPT
iptables -A INPUT -p udp --dport 8805 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls for PFCP port 8805/UDP
  • Deploy monitoring and automatic restart mechanisms for Open5GS services

🔍 How to Verify

Check if Vulnerable:

Check Open5GS version: open5gs --version or examine source code for commit hash

Check Version:

open5gs --version 2>&1 | grep -i version

Verify Fix Applied:

Verify commit 93a9fd98a8baa94289be3b982028201de4534e32 is present in source or version is newer than 2.7.5

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault in Open5GS logs
  • Service crash/restart events
  • PFCP handler error messages

Network Indicators:

  • Unusual PFCP protocol traffic patterns
  • Multiple connection attempts to port 8805/UDP

SIEM Query:

source="open5gs.log" AND ("segmentation fault" OR "null pointer" OR "crash")

🔗 References

📤 Share & Export