Overview
The vulnerability CVE-2025-52322 is a significant cybersecurity issue found in Open5GS v2.7.2 and earlier versions. Open5GS, a software stack for 5G, is used extensively across various industries, making the impact of this vulnerability widespread. The issue allows a remote attacker to cause a denial-of-service (DoS) attack, leading to potential system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-52322
Severity: High (7.5 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Denial of Service, potential system compromise, or data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Open5GS | v2.7.2 and before
How the Exploit Works
The vulnerability exploits a flaw in the way Open5GS handles the Create Session Request message to the Session Management Function (SMF). An attacker can craft a special Create Session Request message using the IP address of a legitimate User Equipment (UE) in the Packet Data Network Address Allocation (PAA) field. This malicious request causes the software to crash, resulting in a denial of service.
Conceptual Example Code
The below pseudocode demonstrates how an attacker might exploit the vulnerability:
# Pseudo code for exploit
def exploit(target_ip, legitimate_ue_ip):
# Craft the malicious Create Session Request message
message = create_session_request()
message.set_paa_field(legitimate_ue_ip)
# Send the message to the target
send_message(target_ip, message)
Note: The actual exploit would likely involve more complex code and a deeper understanding of the Open5GS protocol and message structure. The provided example is a simplified representation meant to illustrate the basic concept of the exploit.
Mitigation Guidance
To mitigate this vulnerability, users of Open5GS are advised to apply the vendor-provided patch as soon as possible. If the patch cannot be applied immediately, the use of a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. These measures can help detect and block malicious Create Session Request messages, preventing the DoS attack.
