Impact
A bug in the BSF component of Open5GS allows an attacker to cause a denial of service by sending a crafted ipv4Addr value to the bsf_sess_add_by_ip_address function. The vulnerability resides in the way the input is handled, leading to a crash or resource exhaustion. It represents a missing input validation weakness classified as CWE-404. An attacker who can send requests to the BSF management endpoint can exploit this flaw to interrupt service availability for the affected node.
Affected Systems
Open5GS Open5GS, all versions up to and including 2.7.7, are affected. No other vendors or products are listed.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity. The EPSS score is not available, and the flaw is not listed in the CISA KEV catalog. The attack can be launched remotely via the BSF management interface, and a public exploit has been disclosed. An attacker who can reach the exposed endpoint could repeatedly trigger the bug, leading to sustained denial of service until the system is restarted or patched.
OpenCVE Enrichment