{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15532","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-16T16:35:56.438Z","datePublished":"2026-01-17T16:32:07.558Z","dateUpdated":"2026-02-26T15:58:53.346Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:32:45.380Z"},"title":"Open5GS Timer resource consumption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-400","lang":"en","description":"Resource Consumption"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"Open5GS","versions":[{"version":"2.7.0","status":"affected"},{"version":"2.7.1","status":"affected"},{"version":"2.7.2","status":"affected"},{"version":"2.7.3","status":"affected"},{"version":"2.7.4","status":"affected"},{"version":"2.7.5","status":"affected"}],"cpes":["cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*"],"modules":["Timer Handler"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Open5GS up to 2.7.5. This issue affects some unknown processing of the component Timer Handler. The manipulation results in resource consumption. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The patch is identified as c7c131f8d2cb1195ada5e0e691b6868ebcd8a845. It is best practice to apply a patch to resolve this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-01-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-09T21:59:42.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ZiyuLin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.341599","name":"VDB-341599 | Open5GS Timer resource consumption","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.341599","name":"VDB-341599 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.729354","name":"Submit #729354 | Open5GS SGWC v2.7.6 Denial of Service","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.729357","name":"Submit #729357 | Open5GS SGWC v2.7.6 Denial of Service (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.735340","name":"Submit #735340 | Open5GS SMF v2.7.6 Denial of Service (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.735341","name":"Submit #735341 | Open5GS SGWC v2.7.6 Denial of Service (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.735342","name":"Submit #735342 | Open5GS SGWC v2.7.6 Denial of Service (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/open5gs/open5gs/issues/4220","tags":["issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/issues/4221","tags":["issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/issues/4220#issue-3766066853","tags":["exploit","issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/commit/c7c131f8d2cb1195ada5e0e691b6868ebcd8a845","tags":["patch"]},{"url":"https://github.com/open5gs/open5gs/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-20T21:27:08.727039Z","id":"CVE-2025-15532","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T15:58:53.346Z"}}]}}