Description
A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-16
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A malformed Create PDP Context request triggers a reachable assertion in the Open5GS SMF component, causing the SMF process to crash. The flaw results from insufficient verification of the request data, aligned with CWE‑617, and leads to a denial of service for the SMF service.

Affected Systems

The vulnerability is present in all Open5GS releases up to and including version 2.7.6. It affects the SMF’s smf_gn_handle_create_pdp_context_request function located in gn-handler.c. Any deployment of Open5GS 2.7.6 or earlier is impacted, while newer releases are not documented to contain this issue.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity flaw, and the EPSS score of less than 1 % suggests that exploitation is currently infrequent. The flaw is not listed in the CISA KEV catalogue, implying no confirmed active exploitation at the time of analysis. The publicly available exploit demonstrates that the assertion can be triggered remotely through the SMF interface, providing attackers the opportunity to bring the service down without local privileges.

Generated by OpenCVE AI on April 18, 2026 at 18:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Open5GS release that contains a fix for the assertion.
  • If an immediate upgrade is not feasible, restrict external access to the SMF interfaces using firewall rules or by placing the SMF behind a VPN to limit exposure to malformed requests.
  • Enable logging of SMF crashes and monitor logs for assertion failure messages; consider adding intrusion detection rules for anomalous SMF traffic.

Generated by OpenCVE AI on April 18, 2026 at 18:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Open5gs
Open5gs open5gs
Vendors & Products Open5gs
Open5gs open5gs

Mon, 16 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS SMF gn-handler.c smf_gn_handle_create_pdp_context_request assertion
Weaknesses CWE-617
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:02:59.705Z

Reserved: 2026-02-15T08:39:59.010Z

Link: CVE-2026-2523

cve-icon Vulnrichment

Updated: 2026-02-17T17:15:23.224Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T01:15:53.767

Modified: 2026-02-18T19:07:48.960

Link: CVE-2026-2523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:15:06Z

Weaknesses