Description
A vulnerability was determined in Open5GS up to 2.7.6. The affected element is the function smf_gx_cca_cb/smf_gy_cca_cb/smf_s6b_aaa_cb/smf_s6b_sta_cb of the component CCA Handler. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.7.7 is sufficient to fix this issue. Patch name: 80eb484a6ab32968e755e628b70d1a9c64f012ec. Upgrading the affected component is recommended.
Published: 2026-03-16
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

Key detail from CVE description: A vulnerability exists in Open5GS up to version 2.7.6 within the CCA Handler component (functions smf_gx_cca_cb, smf_gy_cca_cb, smf_s6b_aaa_cb, smf_s6b_sta_cb). The flaw allows remote manipulation that triggers a denial of service, potentially causing the SMF to crash or exhaust resources (Key detail from CVE description).

Affected Systems

Affected product: Open5GS from any release before 2.7.7. The risk applies to the smf_s6b_sta_cb handler path and associated functions listed in the CVE (Key detail from CVE description). No granular version matrix is provided, but all releases up to and including 2.7.6 are vulnerable. Version 2.7.7 or later contains the patch commit 80eb484a6ab32968e755e628b70d1a9c64f012ec, which resolves the issue (Reference: https://github.com/open5gs/open5gs/releases/tag/v2.7.7).

Risk and Exploitability

CVSS base score of 6.9 indicates a medium‑to‑high severity (Key detail from SCORES). EPSS data is not available, and the vulnerability is not listed in CISA’s KEV catalog. The description notes the attack can be initiated remotely and the exploit is publicly disclosed, implying that attackers can use the flaw without privileged access (Key detail from CVE description). Consequently, the risk to impacted networks is significant and warrants prompt action.

Generated by OpenCVE AI on March 17, 2026 at 12:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to version 2.7.7 or later (Key detail from CVE description and reference to Open5GS release v2.7.7).
  • If an upgrade cannot be performed immediately, restrict external access to the SMF component and monitor for repeated connection attempts that may indicate exploitation (Key detail from CVE description).
  • Verify that the patch commit 80eb484a6ab32968e755e628b70d1a9c64f012ec has been applied in the installed codebase (Key detail from CVE description).

Generated by OpenCVE AI on March 17, 2026 at 12:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Open5GS up to 2.7.6. The affected element is the function smf_gx_cca_cb/smf_gy_cca_cb/smf_s6b_aaa_cb/smf_s6b_sta_cb of the component CCA Handler. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.7.7 is sufficient to fix this issue. Patch name: 80eb484a6ab32968e755e628b70d1a9c64f012ec. Upgrading the affected component is recommended.
Title Open5GS CCA smf_s6b_sta_cb denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T14:25:31.568Z

Reserved: 2026-03-15T20:40:37.925Z

Link: CVE-2026-4240

cve-icon Vulnrichment

Updated: 2026-03-16T14:25:28.428Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:20:18.963

Modified: 2026-03-20T18:15:15.653

Link: CVE-2026-4240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:44:29Z

Weaknesses