Impact
The vulnerability is an assertion failure in the SGWC module of Open5GS that occurs when adding a tunnel with a manipulated PDR parameter. When triggered, the assertion aborts the SGWC process, causing the network element to crash. This leads to a denial of service against services that depend on SGWC, but there is no evidence that an attacker can execute arbitrary code or gain control of the system.
Affected Systems
All Open5GS SGWC deployments using versions up to and including 2.7.6 are affected. Versions released after 2.7.6 contain a fix that removes the vulnerable assertion. The flaw exists specifically in the sgwc_tunnel_add function within /src/sgwc/context.c.
Risk and Exploitability
The CVSS score of 6.9 indicates medium severity, while an EPSS score of less than 1% suggests low exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can trigger the flaw remotely by sending crafted PDR data to the SGW‑C interface; no local privileges are required. The predictable impact is a crash of the SGW‑C process, which can be used to disrupt network services but does not provide code execution or data exfiltration.
OpenCVE Enrichment