Impact
A bug in the Open5GS access‑management function amf_nudm_sdm_handle_provisioned in nudm-handler.c allows an attacker to trigger a crash of the AMF service, resulting in a denial of service. The flaw is a resource handling error identified as CWE‑404. When exploitable input is processed, the AMF component restarts and becomes temporarily unavailable, which interrupts all 5G network services that rely on AMF messaging. This loss of availability is the primary effect noted in the advisory.
Affected Systems
The vulnerability affects Open5GS releases through version 2.7.7. All users running Linux builds of Open5GS that include the AMF component are impacted, while newer releases beyond 2.7.7 are not mentioned as affected.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity level. No EPSS score is published, but the advisory states the exploit is publicly disclosed and can be launched remotely, suggesting a realistic risk in environments exposing the AMF endpoint. The vulnerability is not listed in CISA’s KEV catalog, so it has not yet attracted mass exploitation campaigns, yet the remote nature and lack of a patch response create a tangible risk for operators who expose AMF traffic to untrusted networks.
OpenCVE Enrichment