CVE-2025-65559
📋 TL;DR
A reachable assertion vulnerability in Open5GS UPF component causes denial of service when processing malformed PFCP Session Establishment Requests with mismatched address-family flags. This affects Open5GS deployments using the UPF component, potentially disrupting 5G network services.
💻 Affected Systems
- Open5GS
📦 What is this software?
Open5gs by Open5gs
⚠️ Risk & Real-World Impact
Worst Case
Complete UPF crash leading to denial of 5G user plane services for affected network slices, disrupting data connectivity for subscribers.
Likely Case
Targeted DoS attacks causing intermittent UPF crashes and service disruption for specific DNN configurations.
If Mitigated
Limited impact with proper network segmentation and monitoring, allowing quick service restoration.
🎯 Exploit Status
Exploitation requires ability to send PFCP messages to UPF, typically from within the 5G core network.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check GitHub issue for latest fix
Vendor Advisory: https://github.com/open5gs/open5gs/issues/4135
Restart Required: Yes
Instructions:
1. Monitor GitHub issue #4135 for official patch. 2. Update Open5GS to patched version. 3. Restart UPF service.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict PFCP access to trusted network elements only
iptables -A INPUT -p udp --dport 8805 -s trusted_ip -j ACCEPT
iptables -A INPUT -p udp --dport 8805 -j DROP
🧯 If You Can't Patch
- Implement network monitoring for PFCP traffic anomalies
- Deploy redundant UPF instances with load balancing to maintain service during crashes
🔍 How to Verify
Check if Vulnerable:
Check Open5GS version and verify if UPF component is running vulnerable code from lib/pfcp/context.c
Check Version:
open5gs-upfd --version
Verify Fix Applied:
Test with malformed PFCP Session Establishment Request containing CH=1 and mismatched address-family flags
📡 Detection & Monitoring
Log Indicators:
- UPF crash logs
- Assertion failure in ogs_pfcp_object_teid_hash_set
- PFCP session establishment failures
Network Indicators:
- Unusual PFCP type=50 requests with CH=1 flag
- Sudden drop in GTP-U traffic
SIEM Query:
source="open5gs-upf.log" AND "assertion failed" AND "ogs_pfcp_object_teid_hash_set"