An issue in UPF in Open5GS UPF versions up to v2.7.2 results an assertion failure vulnerability in PFCP session parameter validation. When processing a PFCP Session Establishment Request with PDN Type=0, the UPF fails to handle the invalid value propagated from SMF (or via direct attack), triggering a fatal assertion check and causing a daemon crash.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/open5gs/open5gs/issues/3727 |
![]() ![]() |
History
Thu, 19 Jun 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Open5gs
Open5gs open5gs |
|
CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
Vendors & Products |
Open5gs
Open5gs open5gs |
Wed, 23 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-617 | |
Metrics |
cvssV3_1
|
Tue, 22 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue in UPF in Open5GS UPF versions up to v2.7.2 results an assertion failure vulnerability in PFCP session parameter validation. When processing a PFCP Session Establishment Request with PDN Type=0, the UPF fails to handle the invalid value propagated from SMF (or via direct attack), triggering a fatal assertion check and causing a daemon crash. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-04-22T00:00:00.000Z
Updated: 2025-04-23T13:36:39.811Z
Reserved: 2025-03-11T00:00:00.000Z
Link: CVE-2025-29339

Updated: 2025-04-23T13:36:34.049Z

Status : Analyzed
Published: 2025-04-22T17:16:46.827
Modified: 2025-06-19T00:23:24.013
Link: CVE-2025-29339

No data.