Description
A weakness has been identified in Open5GS up to 2.7.6. This vulnerability affects the function sgwc_s5c_handle_modify_bearer_response of the file src/sgwc/s5c-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This patch is called b19cf6a. Applying a patch is advised to resolve this issue. The issue report is flagged as already-fixed.
Published: 2026-01-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability is in the sgwc_s5c_handle_modify_bearer_response routine of Open5GS’s SGWC component. A malformed Modify Bearer Response message enables a remote attacker to trigger a logic path that fails to properly release resources, resulting in a denial of service. The attacker need not obtain privileged credentials; the exploit operates over the network interface used for S5C signalling and is publicly available.

Affected Systems

Products affected are Open5GS deployments using the SGWC module, specifically versions up to and including 2.7.6. The vulnerability pertains to the open-source SGWC component of Open5GS.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. The EPSS value of less than one percent suggests a low likelihood of widespread exploitation, and the vulnerability is not tracked in the CISA KEV catalog. Nevertheless, the remote attack vector and availability impact mean that a service outage could be disruptive to subscriber connectivity. The fix is publicly available as commit b19cf6a.

Generated by OpenCVE AI on April 18, 2026 at 14:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the public patch corresponding to commit b19cf6a to the Open5GS SGWC component.
  • Deploy the patched SGWC binaries to all active SGWC nodes in the deployment.
  • Restart SGWC services to ensure the patched code is in use.

Generated by OpenCVE AI on April 18, 2026 at 14:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
References

Mon, 02 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Open5gs
Open5gs open5gs
Vendors & Products Open5gs
Open5gs open5gs

Wed, 28 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Open5GS up to 2.7.6. This vulnerability affects the function sgwc_s5c_handle_modify_bearer_response of the file src/sgwc/s5c-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This patch is called b19cf6a. Applying a patch is advised to resolve this issue. The issue report is flagged as already-fixed.
Title Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:00:29.743Z

Reserved: 2026-01-28T10:14:15.433Z

Link: CVE-2026-1522

cve-icon Vulnrichment

Updated: 2026-01-28T16:42:04.088Z

cve-icon NVD

Status : Modified

Published: 2026-01-28T17:16:15.330

Modified: 2026-02-23T09:16:57.013

Link: CVE-2026-1522

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses