CVE-2025-15555

7.3 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Open5GS allows remote attackers to execute arbitrary code or cause denial of service by manipulating the OGS_KEY_LEN argument in the VoLTE Cx-Test component. This affects Open5GS deployments up to version 2.7.6 that have the HSS component enabled. Attackers can exploit this without authentication to potentially take control of affected systems.

💻 Affected Systems

Products:
  • Open5GS
Versions: Up to and including 2.7.6
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments with HSS component enabled and VoLTE Cx-Test functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Denial of service causing VoLTE service disruption or system crashes.

🟢

If Mitigated

Limited impact with proper network segmentation and exploit prevention controls in place.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects network-facing components.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the HSS component.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability is remotely exploitable without authentication, but specific exploit details are not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit 54dda041211098730221d0ae20a2f9f9173e7a21

Vendor Advisory: https://github.com/open5gs/open5gs/issues/4177

Restart Required: Yes

Instructions:

1. Update Open5GS to a version containing commit 54dda041211098730221d0ae20a2f9f9173e7a21
2. Rebuild from source if using source installation
3. Restart all Open5GS services
4. Verify the patch is applied by checking the commit hash

🔧 Temporary Workarounds

Disable HSS component

linux

Temporarily disable the HSS component if not required for your deployment

systemctl stop open5gs-hssd
disable the hss service in your configuration

Network segmentation

linux

Restrict network access to the HSS component using firewall rules

iptables -A INPUT -p tcp --dport <hss_port> -s <trusted_ips> -j ACCEPT
iptables -A INPUT -p tcp --dport <hss_port> -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the HSS component from untrusted networks
  • Deploy intrusion prevention systems (IPS) with buffer overflow detection rules

🔍 How to Verify

Check if Vulnerable:

Check Open5GS version: open5gs --version should show 2.7.6 or earlier. Verify HSS component is running: systemctl status open5gs-hssd

Check Version:

open5gs --version

Verify Fix Applied:

Verify the commit hash contains 54dda041211098730221d0ae20a2f9f9173e7a21. Check version is newer than 2.7.6.

📡 Detection & Monitoring

Log Indicators:

  • Abnormal HSS process crashes
  • Unusual memory access patterns in system logs
  • Failed authentication attempts with malformed OGS_KEY_LEN

Network Indicators:

  • Unusual traffic patterns to HSS port
  • Malformed Diameter protocol messages
  • Unexpected connection attempts to Cx-Test interface

SIEM Query:

source="open5gs" AND (process="hss" OR component="hss-cx-path") AND (event="crash" OR event="buffer_overflow" OR message="*OGS_KEY_LEN*")

🔗 References

📤 Share & Export