CVE-2025-15176

Source
https://cve.org/CVERecord?id=CVE-2025-15176
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15176.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15176
Published
2025-12-29T07:15:54.153Z
Modified
2026-03-14T15:03:59.187005Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw has been found in Open5GS up to 2.7.5. This affects the function decodeipv6header/ogspfcppdrrulefindbypacket of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing a manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.

References

Affected packages

Git / github.com/open5gs/open5gs

Affected ranges

Type
GIT
Repo
https://github.com/open5gs/open5gs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.7.5"
        }
    ]
}

Affected versions

v0.*
v0.1.0
v0.1.1
v0.2.0
v0.3.0
v0.3.1
v0.3.10
v0.3.11
v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.3.9
v0.4.0
v0.4.1
v0.4.2
v0.4.3
v0.4.4
v0.5.0
v0.5.1
v0.5.2
v1.*
v1.0.0
v1.1.0
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.2.4
v1.3.0
v2.*
v2.0.0
v2.0.18
v2.0.22
v2.1.0
v2.1.1
v2.1.3
v2.1.4
v2.1.5
v2.1.7
v2.2.0
v2.2.1
v2.2.6
v2.2.7
v2.2.8
v2.2.9
v2.3.0
v2.3.1
v2.3.2
v2.3.6
v2.4.0
v2.4.1
v2.4.3
v2.4.4
v2.4.5
v2.4.7
v2.4.8
v2.4.9
v2.6.1
v2.6.2
v2.6.3
v2.6.4
v2.6.6
v2.7.0
v2.7.1
v2.7.2
v2.7.5
v2.7.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15176.json"
vanir_signatures
[
    {
        "signature_type": "Function",
        "id": "CVE-2025-15176-04d90207",
        "source": "https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8",
        "signature_version": "v1",
        "target": {
            "function": "ogs_pfcp_pdr_rule_find_by_packet",
            "file": "lib/pfcp/rule-match.c"
        },
        "deprecated": false,
        "digest": {
            "function_hash": "224595586093372610334973982066109524472",
            "length": 3879.0
        }
    },
    {
        "signature_type": "Function",
        "id": "CVE-2025-15176-21e14dfc",
        "source": "https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8",
        "signature_version": "v1",
        "target": {
            "function": "decode_ipv6_header",
            "file": "lib/pfcp/rule-match.c"
        },
        "deprecated": false,
        "digest": {
            "function_hash": "95311032292782465092123068315204723745",
            "length": 1215.0
        }
    },
    {
        "signature_type": "Line",
        "id": "CVE-2025-15176-4529e740",
        "source": "https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8",
        "signature_version": "v1",
        "target": {
            "file": "lib/pfcp/rule-match.c"
        },
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "98395855156108212348324295070959876643",
                "81917621401062981579211438984474086141",
                "148948975243721770274949665128213546919",
                "114801660388365789846224331108658987983",
                "272206623693082352895425889646915242652",
                "180182338297027885276464626404714994047",
                "332466580861982701571769328891817348154",
                "9806832882383682570218898558927050594"
            ]
        }
    }
]