Description
A flaw has been found in Open5GS up to 2.7.7. This issue affects the function bsf_sess_find_by_ipv6prefix of the file /src/bsf/context.c of the component BSF. This manipulation of the argument ipv6Prefix causes denial of service. It is possible to initiate the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-01
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Open5GS up to version 2.7.7 allows an attacker to manipulate the ipv6Prefix argument to the bsf_sess_find_by_ipv6prefix function in the BSF context module, triggering a denial of service failure. The vulnerability is a classic resource exhaustion issue, known as CWE‑404, where improper handling of the prefix leads to exhaustion of internal session resources and service disruption.

Affected Systems

The issue affects the Open5GS project, specifically the BSF component. All Open5GS deployments running any version up to 2.7.7 are potentially impacted. No specific sub‑versions are listed beyond this upper bound; therefore, any installation of Open5GS between the initial release and 2.7.7 should be considered vulnerable.

Risk and Exploitability

The CVSS score of 5.3 places this vulnerability in the medium severity range. The EPSS score is not available, and it is not listed in the CISA KEV catalog. The attack can be initiated remotely, and the exploit code has already been published, indicating realistic exploitation potential. Without patching or mitigating controls, an attacker can cause sustained denial of service to the BSF service, potentially disrupting user plane connectivity for affected networks.

Generated by OpenCVE AI on May 1, 2026 at 22:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Open5GS to a fixed release if one is available
  • Restrict access to the BSF interface to a whitelist of trusted IP addresses or networks
  • Apply application‑level rate limiting or connection throttling to the BSF service

Generated by OpenCVE AI on May 1, 2026 at 22:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 15:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Open5GS up to 2.7.7. This issue affects the function bsf_sess_find_by_ipv6prefix of the file /src/bsf/context.c of the component BSF. This manipulation of the argument ipv6Prefix causes denial of service. It is possible to initiate the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS BSF context.c bsf_sess_find_by_ipv6prefix denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T21:30:21.958Z

Reserved: 2026-05-01T07:03:42.855Z

Link: CVE-2026-7583

cve-icon Vulnrichment

Updated: 2026-05-01T21:30:18.196Z

cve-icon NVD

Status : Deferred

Published: 2026-05-01T15:16:54.180

Modified: 2026-05-01T15:26:24.553

Link: CVE-2026-7583

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T23:00:14Z

Weaknesses