CVE-2025-15539

Source
https://cve.org/CVERecord?id=CVE-2025-15539
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15539.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15539
Published
2026-01-19T00:15:47.693Z
Modified
2026-03-15T22:50:34.341125Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was determined in Open5GS up to 2.7.6. Impacted is the function sgwcs11handledownlinkdatanotificationack of the file src/sgwc/s11-handler.c of the component sgwc. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: b4707272c1caf6a7d4dca905694ea55557a0545f. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.

References

Affected packages

Git / github.com/open5gs/open5gs

Affected ranges

Type
GIT
Repo
https://github.com/open5gs/open5gs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.7.6"
        }
    ]
}

Affected versions

v0.*
v0.1.0
v0.1.1
v0.2.0
v0.3.0
v0.3.1
v0.3.10
v0.3.11
v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.3.9
v0.4.0
v0.4.1
v0.4.2
v0.4.3
v0.4.4
v0.5.0
v0.5.1
v0.5.2
v1.*
v1.0.0
v1.1.0
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.2.4
v1.3.0
v2.*
v2.0.0
v2.0.18
v2.0.22
v2.1.0
v2.1.1
v2.1.3
v2.1.4
v2.1.5
v2.1.7
v2.2.0
v2.2.1
v2.2.6
v2.2.7
v2.2.8
v2.2.9
v2.3.0
v2.3.1
v2.3.2
v2.3.6
v2.4.0
v2.4.1
v2.4.3
v2.4.4
v2.4.5
v2.4.7
v2.4.8
v2.4.9
v2.6.1
v2.6.2
v2.6.3
v2.6.4
v2.6.6
v2.7.0
v2.7.1
v2.7.2
v2.7.5
v2.7.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15539.json"
vanir_signatures
[
    {
        "id": "CVE-2025-15539-7489a089",
        "digest": {
            "line_hashes": [
                "313669102662231711030006735957649972120",
                "43246333233299638694869726788369963575",
                "316241755027875517435813635740419606862",
                "92254811188144562291646303124244870227",
                "241406018270198916868878378804202062155",
                "290637539197315227551026379223595101076",
                "1250859378627922729799997938905502133",
                "116997803931702360201172706296080329181",
                "118825016005470358829092605123661352479",
                "176644275280501722931395847582265742487",
                "260429860762159756771362083143653962913",
                "82386538622618925668292812438065549709",
                "28862460947784211119434408827426956446",
                "247745065171475967776769060353417820907",
                "197253493880040242493215204027617494981",
                "62831571897844475761006753600654002566",
                "241614931255065723995297317483363737015",
                "271213258520105027318910422329761679817",
                "171154762923474182970074016441109013992"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "source": "https://github.com/open5gs/open5gs/commit/b4707272c1caf6a7d4dca905694ea55557a0545f",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "src/sgwc/s11-handler.c"
        }
    },
    {
        "id": "CVE-2025-15539-e3da0d42",
        "digest": {
            "function_hash": "109559252747677377181125104709764980028",
            "length": 1116.0
        },
        "signature_type": "Function",
        "source": "https://github.com/open5gs/open5gs/commit/b4707272c1caf6a7d4dca905694ea55557a0545f",
        "deprecated": false,
        "signature_version": "v1",
        "target": {
            "file": "src/sgwc/s11-handler.c",
            "function": "sgwc_s11_handle_downlink_data_notification_ack"
        }
    }
]