目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-41067 PoC — Open5GS 安全漏洞

来源
关联漏洞
标题:Open5GS 安全漏洞 (CVE-2025-41067)
Description:Open5GS是Open5GS开源的一个 5G Core 和 Epc 的 C 语言开源实现,即 Lte/Nr 网络的核心网络。 Open5GS 2.7.5及之前版本存在安全漏洞,该漏洞源于可达断言问题,可能导致拒绝服务攻击。
Description
This repository contains the Proof-of-Concept (PoC) exploit scripts for two vulnerabilities, CVE-2025-41067 and CVE-2025-41068. These vulnerabilities affect the NRF (Network Repository Function) component of Open5GS in versions prior to 2.7.6 and can be triggered by an attacker to cause a Denial of Service (DoS).
介绍
# Open5GS NRF Denial of Service (CVE-2025-41067 & CVE-2025-41068)

This repository contains Proof-of-Concept (PoC) exploit scripts for two high-severity vulnerabilities discovered in NewPlane's Open5GS. These vulnerabilities can be triggered by an attacker to cause a Denial of Service (DoS) in the NRF (Network Repository Function) component.

## Vulnerability Details

*   **CVEs:** `CVE-2025-41067`, `CVE-2025-41068`
*   **Affected Software:** Open5GS
*   **Affected Component:** Network Repository Function (NRF)
*   **Affected Versions:** Prior to `2.7.6`
*   **Impact:** Denial of Service (DoS)
*   **GitHub Issues:**
    * [CVE-2025-41067](https://github.com/open5gs/open5gs/issues/3845)
    * [CVE-2025-41068](https://github.com/open5gs/open5gs/issues/3846)

## Official Advisory

The coordinated disclosure and official advisory for these vulnerabilities can be found on INCIBE's website:
*   [**INCIBE-CERT Advisory: Multiple vulnerabilities in NewPlane's Open5GS**](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-newplanes-open5gs)

## Description

The vulnerabilities are reachable assertions within the Open5GS NRF. An attacker with network connectivity to the NRF's HTTP/2 interface can send specific sequences of API requests that cause the `open5gs-nrfd` process to crash. This renders the 5G network's discovery service inoperable.

This repository includes two distinct scripts to trigger the crash through different methods.

### Scripts Included

1.  **`CVE-2025-41067.py`**
    This script triggers the vulnerability by performing the following actions:
    *   It queries the `/nnrf-nfm/v1/nf-instances` endpoint to get a list of all network functions.
    *   It iterates through the results, identifying any instances where `nfType` is `NRF`.
    *   It then sends a `DELETE` request for each identified NRF instance. This action on a self-referential instance causes the NRF process to crash.

2.  **`CVE-2025-41068.py`**
    This script triggers a similar vulnerability through a different vector:
    *   It first sends a `PUT` request to register a new NF instance with a **non-existent `nfType` ('EMF')**.
    *   Subsequently, when the script requests a list of all NF instances, the NRF attempts to process this invalid entry, which crashes the service.

## Prerequisites

*   Python 3.6+
*   The `httpx` library with HTTP/2 support.

You can install the necessary dependency with pip:
```bash
pip install -r requirements.txt
```

## Usage

Both scripts are run from the command line, with the IP address of the target Open5GS NRF as the only argument.

**To run the deletion-based exploit:**
```bash
python CVE-2025-41067.py <NRF_TARGET_IP>
```

**To run the registration-based exploit:**
```bash
python CVE-2025-41068.py <NRF_TARGET_IP>
```

**Example:**
```bash
python CVE-2025-41067.py 192.168.50.10
```

## Disclaimer

These scripts are intended for educational purposes, authorized security testing, and research only. The author is not responsible for any misuse or damage caused by these tools. Always obtain explicit permission before testing on any system you do not own.

## Acknowledgments
*   The **Open5GS team** for their prompt response and for providing a patch in version `v2.7.6`.
文件快照

[4.0K] /data/pocs/0f9e77b617edc0e043fec5e7570f29623825c0c3 ├── [2.8K] CVE-2025-41067.py ├── [2.5K] CVE-2025-41068.py ├── [3.2K] README.md └── [ 13] requirements.txt 1 directory, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。