Description
A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
Published: 2026-01-29
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in Open5GS SGWC, specifically the function ogs_gtp2_f_teid_to_ip within s11-handler.c. Remote manipulation of the GTPv2 signalling messages can cause a denial of service by corrupting memory handling in the function. The weakness is classified as CWE-404, indicating improper release of resources. The exploit has been published and is known to be usable, meaning an attacker with remote reach can trigger the service crash. The denial of service could render the SGWC component unavailable, disrupting GTP signalling between the Access Gateway and the Core network, which may cascade to affect user plane connectivity.

Affected Systems

Open5GS Open5GS SGWC component is affected in all releases up to and including 2.7.5. Users deploying the Open5GS 5G core stack with SGWC should verify whether their installed version falls within this range and plan to upgrade to a later release that includes the fix.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate impact, while the EPSS score of less than 1% indicates a low probability of automated exploitation in the near term. Nonetheless, the fact that the exploit is publicly available and can be performed over the network warrants caution. The vulnerability is not listed in the CISA KEV catalog, but dependency on raw GTP traffic makes the component attractive for attackers. Remote attackers who can reach the SGWC GTP port can trigger the crash, and no special conditions beyond normal network interaction are required. Accordingly, the risk to any Open5GS deployment that exposes SGWC to untrusted traffic is high until patched.

Generated by OpenCVE AI on April 18, 2026 at 01:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to a release version that includes the patch for sgwc/s11-handler.c (at least 2.8.0).
  • If a patch cannot be applied immediately, restrict inbound GTPv2 traffic to SGWC to trusted networks or apply firewall rules that limit access to known, legitimate UPF or SGW peers.
  • Enable logging of GTPv2 message failures and monitor for repeated failures or crashes; use this as an indicator of attempted exploitation.

Generated by OpenCVE AI on April 18, 2026 at 01:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
References

Mon, 02 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Open5gs
Open5gs open5gs
Vendors & Products Open5gs
Open5gs open5gs

Thu, 29 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 12:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
Title Open5GS SGWC s11-handler.c ogs_gtp2_f_teid_to_ip denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:03:40.681Z

Reserved: 2026-01-29T05:57:08.622Z

Link: CVE-2026-1586

cve-icon Vulnrichment

Updated: 2026-01-29T15:11:25.270Z

cve-icon NVD

Status : Modified

Published: 2026-01-29T13:15:53.113

Modified: 2026-02-23T09:16:59.130

Link: CVE-2026-1586

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:30:16Z

Weaknesses