Impact
A buffer overflow vulnerability exists in the SGW‑C component of Open5GS up to version 2.7.6, linked to the sgwc_s5c_handle_create_session_response function. This flaw can corrupt memory when the function processes crafted Create Session Response messages, potentially allowing an attacker to compromise the server process. The documented weakness is a classic out‑of‑bounds write (CWE‑119).
Affected Systems
The affected software is Open5GS, specifically the SGW‑C module in releases up to and including 2.7.6. No other vendors or product versions are mentioned. The CVE notes that the issue is present in all 2.7.x versions processed by this function.
Risk and Exploitability
The CVSS base score of 6.9 indicates moderate severity; the EPSS score is <1%, suggesting low but non‑zero likelihood of exploitation. Public proof‑of‑concept code is available, and the vulnerability can be triggered remotely, meaning that an attacker only needs network access to the SGW‑C interface. Because the exploit can corrupt memory, it can lead to loss of confidentiality, integrity, or availability of the SGW‑C process, and potentially escalation to other network elements.
OpenCVE Enrichment