CVE-2025-8802
📋 TL;DR
A denial-of-service vulnerability in Open5GS SMF component allows remote attackers to crash the service by manipulating stream arguments in the smf_state_operational function. This affects all Open5GS deployments up to version 2.7.5 that expose the SMF service to untrusted networks. The vulnerability is remotely exploitable without authentication.
💻 Affected Systems
- Open5GS
📦 What is this software?
Open5gs by Open5gs
⚠️ Risk & Real-World Impact
Worst Case
Complete SMF service outage leading to 5G core network disruption, preventing subscriber authentication and session management.
Likely Case
SMF service crash requiring manual restart, causing temporary service interruption for affected subscribers.
If Mitigated
Limited impact with proper network segmentation and monitoring allowing quick detection and recovery.
🎯 Exploit Status
Exploit code has been publicly disclosed in GitHub repositories and attachments, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v2.7.6
Vendor Advisory: https://github.com/open5gs/open5gs/releases/tag/v2.7.6
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Stop Open5GS services. 3. Upgrade to Open5GS v2.7.6 using package manager or source compilation. 4. Apply patch f168f7586a4fa536cee95ae60ac437d997f15b97 if compiling from source. 5. Restart Open5GS services.
🔧 Temporary Workarounds
Network Segmentation
LinuxRestrict access to SMF service ports (typically 8805/udp for PFCP) to trusted networks only
iptables -A INPUT -p udp --dport 8805 -s trusted_network -j ACCEPT
iptables -A INPUT -p udp --dport 8805 -j DROP
🧯 If You Can't Patch
- Implement strict network access controls to limit SMF exposure to only necessary 5G core components
- Deploy monitoring and alerting for SMF service crashes with automated restart capabilities
🔍 How to Verify
Check if Vulnerable:
Check Open5GS version: open5gs-smfd --version should show version <= 2.7.5
Check Version:
open5gs-smfd --version
Verify Fix Applied:
After upgrade, verify version is 2.7.6 or higher and check that commit f168f7586a4fa536cee95ae60ac437d997f15b97 is present in git log
📡 Detection & Monitoring
Log Indicators:
- SMF service crash logs
- Segmentation fault errors in smf-sm.c
- Unexpected termination of open5gs-smfd process
Network Indicators:
- Unusual PFCP traffic patterns to port 8805
- Multiple connection attempts followed by service unavailability
SIEM Query:
process:name="open5gs-smfd" AND (event:type="crash" OR event:type="segfault")
🔗 References
- https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8802
- https://github.com/open5gs/open5gs/commit/f168f7586a4fa536cee95ae60ac437d997f15b97
- https://github.com/open5gs/open5gs/issues/3978
- https://github.com/open5gs/open5gs/releases/tag/v2.7.6
- https://github.com/user-attachments/files/21104269/5G_SMF.AMF_crash.zip
- https://vuldb.com/?ctiid.319330
- https://vuldb.com/?id.319330
- https://vuldb.com/?submit.626122
- https://github.com/open5gs/open5gs/issues/3978