A flaw has been found in Open5GS up to 2.7.5. This affects the function decodeipv6header/ogspfcppdrrulefindbypacket of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing a manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15176.json"
[
{
"signature_type": "Function",
"id": "CVE-2025-15176-04d90207",
"source": "https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8",
"signature_version": "v1",
"target": {
"function": "ogs_pfcp_pdr_rule_find_by_packet",
"file": "lib/pfcp/rule-match.c"
},
"deprecated": false,
"digest": {
"function_hash": "224595586093372610334973982066109524472",
"length": 3879.0
}
},
{
"signature_type": "Function",
"id": "CVE-2025-15176-21e14dfc",
"source": "https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8",
"signature_version": "v1",
"target": {
"function": "decode_ipv6_header",
"file": "lib/pfcp/rule-match.c"
},
"deprecated": false,
"digest": {
"function_hash": "95311032292782465092123068315204723745",
"length": 1215.0
}
},
{
"signature_type": "Line",
"id": "CVE-2025-15176-4529e740",
"source": "https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8",
"signature_version": "v1",
"target": {
"file": "lib/pfcp/rule-match.c"
},
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"98395855156108212348324295070959876643",
"81917621401062981579211438984474086141",
"148948975243721770274949665128213546919",
"114801660388365789846224331108658987983",
"272206623693082352895425889646915242652",
"180182338297027885276464626404714994047",
"332466580861982701571769328891817348154",
"9806832882383682570218898558927050594"
]
}
}
]