๐Ÿ” CVE Alert

CVE-2025-15529

MEDIUM 5.3

Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

CWE CWE-404
Vendor n/a
Product open5gs
Published Jan 16, 2026
Last Updated Feb 23, 2026
Stay Ahead of the Next One

Get instant alerts for n/a open5gs

Be the first to know when new medium vulnerabilities affecting n/a open5gs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / Open5GS
2.7.0 2.7.1 2.7.2 2.7.3 2.7.4 2.7.5 2.7.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.341596 vuldb.com: https://vuldb.com/?ctiid.341596 vuldb.com: https://vuldb.com/?submit.728130 vuldb.com: https://vuldb.com/?submit.738372 github.com: https://github.com/open5gs/open5gs/issues/4226 github.com: https://github.com/open5gs/open5gs/issues/4226#issue-3769595366 github.com: https://github.com/open5gs/open5gs/commit/b19cf6a2dbf5d30811be4488bf059c865bd7d1d2 github.com: https://github.com/open5gs/open5gs/

Credits

๐Ÿ” ZiyuLin (VulDB User)