Description
A security flaw has been discovered in Open5GS 2.7.6. This issue affects the function smf_gx_cca_cb/smf_gy_cca_cb/smf_s6b of the component CCA Message Handler. The manipulation results in denial of service. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is assessed as difficult. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-27
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch ASAP
AI Analysis

Impact

The vulnerability resides in the CCA Message Handler component of Open5GS, specifically within the smf_gx_cca_cb, smf_gy_cca_cb, and smf_s6b functions. Malicious manipulation of these callbacks can trigger a denial‑of‑service condition, disrupting the control plane operations for affected cells. The flaw is classified as CWE‑404, indicating an improper resource shutdown or release. The impact is a loss of network connectivity for users served by the impacted SMF instance, potentially affecting all services that rely on session management.

Affected Systems

Open5GS 2.7.6 is affected. The product is the open‑source 5G core network implementation. No other versions are listed as vulnerable in the provided data.

Risk and Exploitability

The CVSS score of 6.3 reflects moderate severity. Although exploitation is rated difficult and the attack is complex, the exploit has already been released publicly, meaning it may be in use. The attack vector is remote, leveraging the exposed CCA Message interfaces. Because the vulnerability is not listed in CISA's KEV catalog and EPSS data is missing, the risk assessment relies on the available score and public release; overall exposure is moderate to high for environments running the affected Open5GS version.

Generated by OpenCVE AI on March 28, 2026 at 05:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to a patched version that addresses the CCA Message handling flaw.
  • Restrict external access to the SMF CCA Message handler interfaces.
  • Implement network‑level rate limiting or flow control to mitigate potential DoS attacks.
  • Monitor SMF logs for anomalous CCA message activity and respond accordingly.

Generated by OpenCVE AI on March 28, 2026 at 05:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:open5gs:open5gs:2.7.6:*:*:*:*:*:*:*

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Open5GS 2.7.6. This issue affects the function smf_gx_cca_cb/smf_gy_cca_cb/smf_s6b of the component CCA Message Handler. The manipulation results in denial of service. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is assessed as difficult. The exploit has been released to the public and may be used for attacks.
Title Open5GS CCA Message smf_s6b denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T17:42:11.269Z

Reserved: 2026-03-27T12:55:11.605Z

Link: CVE-2026-4988

cve-icon Vulnrichment

Updated: 2026-03-30T17:42:05.016Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T22:16:23.533

Modified: 2026-03-30T17:17:07.327

Link: CVE-2026-4988

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:00:03Z

Weaknesses