Description
A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion. The attack can be executed remotely. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
Published: 2026-02-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is an assertion failure in the SGWC module of Open5GS that occurs when adding a tunnel with a manipulated PDR parameter. When triggered, the assertion aborts the SGWC process, causing the network element to crash. This leads to a denial of service against services that depend on SGWC, but there is no evidence that an attacker can execute arbitrary code or gain control of the system.

Affected Systems

All Open5GS SGWC deployments using versions up to and including 2.7.6 are affected. Versions released after 2.7.6 contain a fix that removes the vulnerable assertion. The flaw exists specifically in the sgwc_tunnel_add function within /src/sgwc/context.c.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while an EPSS score of less than 1% suggests low exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can trigger the flaw remotely by sending crafted PDR data to the SGW‑C interface; no local privileges are required. The predictable impact is a crash of the SGW‑C process, which can be used to disrupt network services but does not provide code execution or data exfiltration.

Generated by OpenCVE AI on April 18, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to version 2.7.7 or later, which eliminates the vulnerable assertion.
  • Restart the SGWC component after the upgrade to ensure the patched code is running.
  • Configure monitoring and alerts for SGWC process termination to detect any unexpected crashes and verify system stability.

Generated by OpenCVE AI on April 18, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Open5gs
Open5gs open5gs
Vendors & Products Open5gs
Open5gs open5gs

Mon, 02 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion. The attack can be executed remotely. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
Title Open5GS SGWC context.c sgwc_tunnel_add assertion
Weaknesses CWE-617
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-06T22:07:55.185Z

Reserved: 2026-02-01T07:44:44.291Z

Link: CVE-2026-1738

cve-icon Vulnrichment

Updated: 2026-02-02T16:00:34.455Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T02:16:10.643

Modified: 2026-02-11T19:34:54.937

Link: CVE-2026-1738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:45:05Z

Weaknesses