Impact
A malformed Create PDP Context request triggers a reachable assertion in the Open5GS SMF component, causing the SMF process to crash. The flaw results from insufficient verification of the request data, aligned with CWE‑617, and leads to a denial of service for the SMF service.
Affected Systems
The vulnerability is present in all Open5GS releases up to and including version 2.7.6. It affects the SMF’s smf_gn_handle_create_pdp_context_request function located in gn-handler.c. Any deployment of Open5GS 2.7.6 or earlier is impacted, while newer releases are not documented to contain this issue.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity flaw, and the EPSS score of less than 1 % suggests that exploitation is currently infrequent. The flaw is not listed in the CISA KEV catalogue, implying no confirmed active exploitation at the time of analysis. The publicly available exploit demonstrates that the assertion can be triggered remotely through the SMF interface, providing attackers the opportunity to bring the service down without local privileges.
OpenCVE Enrichment