Description
A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function sgwc_s5c_handle_create_bearer_request of the file /src/sgwc/s5c-handler.c of the component CreateBearerRequest Handler. Performing a manipulation results in reachable assertion. Remote exploitation of the attack is possible. The exploit is now public and may be used. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.
Published: 2026-02-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is an assertion failure in the CreateBearerRequest handler of Open5GS. When a specially crafted request is processed, the assertion is triggered, causing the system to terminate or become unstable. This can lead to a denial‑of‑service condition for the affected control plane instance, allowing a remote attacker to interrupt network service for connected users.

Affected Systems

Open5GS implementations up to and including version 2.7.6 are affected. The flaw resides in the sgwc_s5c_handle_create_bearer_request component, which processes CreateBearerRequest messages exchanged over the S5c interface.

Risk and Exploitability

The vulnerability carries a CVSS base score of 6.9 and an EPSS score below 1%, indicating a low but non‑zero likelihood of exploitation. Although it is not listed in CISA’s KEV catalogue, the issue has a publicly available exploit. The attack likely proceeds over the network by sending a malformed CreateBearerRequest to the Open5GS instance, exploiting the assertion to crash the process.

Generated by OpenCVE AI on April 18, 2026 at 00:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official Open5GS patch that fixes the assertion in the sgwc_s5c_handle_create_bearer_request function.
  • If a patch is not yet available, upgrade to the newest Open5GS release that contains the fix or apply the source‑level patch provided by the project.
  • Configure network controls or firewall rules to restrict access to the S5c interface to trusted peers until a secure version is deployed.

Generated by OpenCVE AI on April 18, 2026 at 00:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Open5gs
Open5gs open5gs
Vendors & Products Open5gs
Open5gs open5gs

Mon, 02 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function sgwc_s5c_handle_create_bearer_request of the file /src/sgwc/s5c-handler.c of the component CreateBearerRequest Handler. Performing a manipulation results in reachable assertion. Remote exploitation of the attack is possible. The exploit is now public and may be used. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.
Title Open5GS CreateBearerRequest s5c-handler.c sgwc_s5c_handle_create_bearer_request assertion
Weaknesses CWE-617
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:12:28.991Z

Reserved: 2026-02-01T07:44:41.406Z

Link: CVE-2026-1737

cve-icon Vulnrichment

Updated: 2026-02-02T16:13:09.786Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T02:16:10.457

Modified: 2026-02-11T19:34:45.060

Link: CVE-2026-1737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:00:11Z

Weaknesses