Impact
The vulnerability resides in the CCA Message Handler component of Open5GS, specifically the smf_gx_cca_cb, smf_gy_cca_cb, and smf_s6b functions. A malformed or unauthorized message can trigger a crash of the SMF module, leading to a denial of service for traffic routed through that component. The flaw can be invoked remotely, although it requires a sophisticated attack scenario and is considered difficult to exploit. If successfully exploited, the attacker can interrupt service availability to subscribed users, disrupting connectivity in a mobile networking environment.
Affected Systems
Open5GS version 2.7.6 is affected. No other versions are listed in the CNA data, so the risk window is limited to installations of this particular release.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity, while the EPSS value of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not included in the CISA KEV catalog. The exploit has been released publicly, and attacks of this nature are highly complex. Accounted for the remote attack vector and the need for targeted credentials or configuration, the overall risk remains moderate to high for systems running the vulnerable Open5GS release.
OpenCVE Enrichment