Vulnerability Details CVE-2025-8803
A vulnerability, which was classified as problematic, was found in Open5GS up to 2.7.5. Affected is the function gmm_state_de_registered/gmm_state_exception of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 2.7.6 is able to address this issue. The name of the patch is 1f30edac27f69f61cff50162e980fe58fdeb30ca. It is recommended to upgrade the affected component.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.8%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2025-8803
-
cpe:2.3:a:open5gs:open5gs:-
-
cpe:2.3:a:open5gs:open5gs:0.1.0
-
cpe:2.3:a:open5gs:open5gs:0.1.1
-
cpe:2.3:a:open5gs:open5gs:0.2.0
-
cpe:2.3:a:open5gs:open5gs:0.3.0
-
cpe:2.3:a:open5gs:open5gs:0.3.1
-
cpe:2.3:a:open5gs:open5gs:0.3.10
-
cpe:2.3:a:open5gs:open5gs:0.3.11
-
cpe:2.3:a:open5gs:open5gs:0.3.2
-
cpe:2.3:a:open5gs:open5gs:0.3.3
-
cpe:2.3:a:open5gs:open5gs:0.3.4
-
cpe:2.3:a:open5gs:open5gs:0.3.5
-
cpe:2.3:a:open5gs:open5gs:0.3.6
-
cpe:2.3:a:open5gs:open5gs:0.3.7
-
cpe:2.3:a:open5gs:open5gs:0.3.8
-
cpe:2.3:a:open5gs:open5gs:0.3.9
-
cpe:2.3:a:open5gs:open5gs:0.4.0
-
cpe:2.3:a:open5gs:open5gs:0.4.1
-
cpe:2.3:a:open5gs:open5gs:0.4.2
-
cpe:2.3:a:open5gs:open5gs:0.4.3
-
cpe:2.3:a:open5gs:open5gs:0.4.4
-
cpe:2.3:a:open5gs:open5gs:0.5.0
-
cpe:2.3:a:open5gs:open5gs:0.5.1
-
cpe:2.3:a:open5gs:open5gs:0.5.2
-
cpe:2.3:a:open5gs:open5gs:1.0.0
-
cpe:2.3:a:open5gs:open5gs:1.1.0
-
cpe:2.3:a:open5gs:open5gs:1.2.0
-
cpe:2.3:a:open5gs:open5gs:1.2.1
-
cpe:2.3:a:open5gs:open5gs:1.2.2
-
cpe:2.3:a:open5gs:open5gs:1.2.3
-
cpe:2.3:a:open5gs:open5gs:1.2.4
-
cpe:2.3:a:open5gs:open5gs:1.3.0
-
cpe:2.3:a:open5gs:open5gs:2.0.0
-
cpe:2.3:a:open5gs:open5gs:2.0.18
-
cpe:2.3:a:open5gs:open5gs:2.0.20
-
cpe:2.3:a:open5gs:open5gs:2.0.21
-
cpe:2.3:a:open5gs:open5gs:2.0.22
-
cpe:2.3:a:open5gs:open5gs:2.1.0
-
cpe:2.3:a:open5gs:open5gs:2.1.1
-
cpe:2.3:a:open5gs:open5gs:2.1.3
-
cpe:2.3:a:open5gs:open5gs:2.1.4
-
cpe:2.3:a:open5gs:open5gs:2.1.5
-
cpe:2.3:a:open5gs:open5gs:2.1.7
-
cpe:2.3:a:open5gs:open5gs:2.2.0
-
cpe:2.3:a:open5gs:open5gs:2.2.1
-
cpe:2.3:a:open5gs:open5gs:2.2.2
-
cpe:2.3:a:open5gs:open5gs:2.2.3
-
cpe:2.3:a:open5gs:open5gs:2.2.4
-
cpe:2.3:a:open5gs:open5gs:2.2.5
-
cpe:2.3:a:open5gs:open5gs:2.2.6
-
cpe:2.3:a:open5gs:open5gs:2.2.7
-
cpe:2.3:a:open5gs:open5gs:2.2.8
-
cpe:2.3:a:open5gs:open5gs:2.2.9
-
cpe:2.3:a:open5gs:open5gs:2.3.0
-
cpe:2.3:a:open5gs:open5gs:2.3.1
-
cpe:2.3:a:open5gs:open5gs:2.3.2
-
cpe:2.3:a:open5gs:open5gs:2.3.3
-
cpe:2.3:a:open5gs:open5gs:2.3.4
-
cpe:2.3:a:open5gs:open5gs:2.3.6
-
cpe:2.3:a:open5gs:open5gs:2.4.0
-
cpe:2.3:a:open5gs:open5gs:2.4.1
-
cpe:2.3:a:open5gs:open5gs:2.4.10
-
cpe:2.3:a:open5gs:open5gs:2.4.11
-
cpe:2.3:a:open5gs:open5gs:2.4.12
-
cpe:2.3:a:open5gs:open5gs:2.4.13
-
cpe:2.3:a:open5gs:open5gs:2.4.2
-
cpe:2.3:a:open5gs:open5gs:2.4.3
-
cpe:2.3:a:open5gs:open5gs:2.4.4
-
cpe:2.3:a:open5gs:open5gs:2.4.5
-
cpe:2.3:a:open5gs:open5gs:2.4.6
-
cpe:2.3:a:open5gs:open5gs:2.4.7
-
cpe:2.3:a:open5gs:open5gs:2.4.8
-
cpe:2.3:a:open5gs:open5gs:2.4.9
-
cpe:2.3:a:open5gs:open5gs:2.5.6
-
cpe:2.3:a:open5gs:open5gs:2.5.7
-
cpe:2.3:a:open5gs:open5gs:2.6.4
-
cpe:2.3:a:open5gs:open5gs:2.6.6
-
cpe:2.3:a:open5gs:open5gs:2.7.0
-
cpe:2.3:a:open5gs:open5gs:2.7.1
-
cpe:2.3:a:open5gs:open5gs:2.7.2