Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch. | |
| Title | Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service | |
| Weaknesses | CWE-404 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-16T22:02:10.930Z
Reserved: 2026-01-16T16:35:47.286Z
Link: CVE-2025-15529
No data.
Status : Received
Published: 2026-01-16T22:16:18.437
Modified: 2026-01-16T22:16:18.437
Link: CVE-2025-15529
No data.
OpenCVE Enrichment
No data.