Heap-based Buffer Overflow Affecting github.com/free5gc/nas/nasmessage package, versions <1.2.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMFREE5GCNASNASMESSAGE-13058635
  • published26 Sept 2025
  • disclosed23 Sept 2025
  • credithanyi Luo

Introduced: 23 Sep 2025

NewCVE-2025-56394  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

Upgrade github.com/free5gc/nas/nasMessage to version 1.2.1 or higher.

Overview

Affected versions of this package are vulnerable to Heap-based Buffer Overflow due to improper validation of the 5GS mobile identity by the AMF in the Registration Request. An attacker can cause a slice reference overflow by sending specially crafted input data.

CVSS Base Scores

version 4.0
version 3.1