CVE-2025-8800

5.3 MEDIUM

📋 TL;DR

A denial-of-service vulnerability exists in Open5GS AMF component where the esm_handle_pdn_connectivity_request function can be manipulated by remote attackers. This affects Open5GS deployments up to version 2.7.5, potentially disrupting 5G core network services.

💻 Affected Systems

Products:
  • Open5GS
Versions: up to 2.7.5
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects AMF component specifically; requires Open5GS deployment with AMF functionality enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of AMF services leading to denial of 5G network connectivity for affected users

🟠

Likely Case

Service degradation or temporary unavailability of AMF component

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring

🌐 Internet-Facing: MEDIUM - Attack can be launched remotely but requires specific 5G protocol knowledge
🏢 Internal Only: MEDIUM - Internal attackers with network access could exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of 5G NAS protocol and ability to send crafted PDN connectivity requests

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.6

Vendor Advisory: https://github.com/open5gs/open5gs/releases/tag/v2.7.6

Restart Required: Yes

Instructions:

1. Backup current configuration
2. Stop Open5GS services
3. Upgrade to Open5GS 2.7.6 using package manager or source compilation
4. Apply commit 701505102f514cbde2856cd2ebc9bedb7efc820d if building from source
5. Restart Open5GS services

🔧 Temporary Workarounds

Network segmentation

Linux

Restrict access to AMF component to trusted networks only

iptables -A INPUT -p tcp --dport 38412 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 38412 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to AMF component
  • Deploy intrusion detection systems to monitor for anomalous PDN connectivity requests

🔍 How to Verify

Check if Vulnerable:

Check Open5GS version: open5gs --version | grep '2.7' and verify if version is <= 2.7.5

Check Version:

open5gs --version

Verify Fix Applied:

Verify version is 2.7.6 or later and check git log for commit 701505102f514cbde2856cd2ebc9bedb7efc820d

📡 Detection & Monitoring

Log Indicators:

  • AMF crash logs
  • Unusual PDN connectivity request patterns
  • Service restart events

Network Indicators:

  • Abnormal NAS protocol traffic to AMF
  • Multiple failed PDN connectivity requests from single source

SIEM Query:

source="open5gs.log" AND ("AMF crash" OR "esm_handle_pdn_connectivity_request" AND error)

🔗 References

📤 Share & Export