Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-229x-w52j-6f5m

Опубликовано: 29 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 5.3

Описание

A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.

A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.

EPSS

Процентиль: 25%
0.00086
Низкий

5.5 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-617

Связанные уязвимости

CVSS3: 5.3
nvd
около 1 месяца назад

A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.

CVSS3: 5.3
debian
около 1 месяца назад

A flaw has been found in Open5GS up to 2.7.5. This affects the functio ...

EPSS

Процентиль: 25%
0.00086
Низкий

5.5 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-617