Impact
This vulnerability resides in the SGWC component’s sgwc_s5c_handle_bearer_resource_failure_indication function in Open5GS up to version 2.7.6. By sending a crafted Bearer Resource Failure Indication message, an attacker can trigger a denial of service that halts the SGWC process. The flaw can be initiated remotely and the exploit is publicly available, allowing a malicious actor to shut down Open5GS services and disrupt connectivity for connected eNodeBs and user equipment.
Affected Systems
Affected systems are Open5GS deployments running any version up to and including 2.7.6. The vulnerability is specific to the SGWC module, which manages control‑plane communication between the Serving Gateway and the MME. All standard releases within this range are vulnerable unless patched.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate severity denial of service. The EPSS score below 1% indicates a low likelihood of mass exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, the remote attack vector and public availability of the exploit mean that a network exposed to potential adversaries could be targeted. Because the flaw causes a process crash, affected systems will continue to be unavailable until a reboot or patch is applied, making it a high‑priority issue for mission‑critical environments.
OpenCVE Enrichment