Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 06 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* |
Tue, 06 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| Vendors & Products |
Open5gs
Open5gs open5gs |
Thu, 01 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function ogs_gtp2_parse_bearer_qos in the library lib/gtp/v2/types.c of the component Bearer QoS IE Length Handler. Performing manipulation results in denial of service. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is named 4e913d21f2c032b187815f063dbab5ebe65fe83a. To fix this issue, it is recommended to deploy a patch. | |
| Title | Open5GS Bearer QoS IE Length types.c ogs_gtp2_parse_bearer_qos denial of service | |
| Weaknesses | CWE-404 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-05T21:50:43.884Z
Reserved: 2026-01-01T10:57:04.431Z
Link: CVE-2025-15418
Updated: 2026-01-05T20:47:53.279Z
Status : Analyzed
Published: 2026-01-02T00:15:43.047
Modified: 2026-01-06T15:06:20.447
Link: CVE-2025-15418
No data.
OpenCVE Enrichment
Updated: 2026-01-05T10:14:24Z