Impact
A flaw in Open5GS SMF's ogs_gtp2_parse_tft function can be triggered by manipulating the pf[0].content.length field provided in a GTPv2 packet. The manipulation causes the function to crash or behave unpredictably, leading to a denial of service for the SMF process. This weakness is classified as CWE-404 and results in loss of availability for the affected service and any downstream network functions that rely on the SMF.
Affected Systems
Version 2.7.6 and earlier of the Open5GS stack, specifically the SMF component that processes GTPv2 messages. The issue resides in the lib/gtp/v2/types.c source file of Open5GS and does not affect later releases beyond 2.7.6.
Risk and Exploitability
The CVSS base score is 6.9, indicating a medium severity vulnerability. Exploitation probability is low with an EPSS score below 1%, and the vulnerability is not listed in CISA's KEV catalog, suggesting limited active exploitation. However, the exploit code has been released publicly and the flaw can be triggered remotely via crafted GTPv2 traffic without authentication, making it a legitimate threat to any exposed Open5GS deployment.
OpenCVE Enrichment