Description
A vulnerability was determined in Open5GS up to 2.7.7. The impacted element is the function amf_nudm_sdm_handle_provisioned of the file /src/amf/nudm-handler.c of the component AMF. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-01
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A bug in the Open5GS access‑management function amf_nudm_sdm_handle_provisioned in nudm-handler.c allows an attacker to trigger a crash of the AMF service, resulting in a denial of service. The flaw is a resource handling error identified as CWE‑404. When exploitable input is processed, the AMF component restarts and becomes temporarily unavailable, which interrupts all 5G network services that rely on AMF messaging. This loss of availability is the primary effect noted in the advisory.

Affected Systems

The vulnerability affects Open5GS releases through version 2.7.7. All users running Linux builds of Open5GS that include the AMF component are impacted, while newer releases beyond 2.7.7 are not mentioned as affected.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity level. No EPSS score is published, but the advisory states the exploit is publicly disclosed and can be launched remotely, suggesting a realistic risk in environments exposing the AMF endpoint. The vulnerability is not listed in CISA’s KEV catalog, so it has not yet attracted mass exploitation campaigns, yet the remote nature and lack of a patch response create a tangible risk for operators who expose AMF traffic to untrusted networks.

Generated by OpenCVE AI on May 1, 2026 at 22:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Open5GS patch or upgrade to a version beyond 2.7.7, which removes the vulnerability in amf_nudm_sdm_handle_provisioned.
  • Restrict external access to the AMF component by firewalling or placing it behind an intranet gateway to limit remote exploitation vectors.
  • Enable detailed logging for AMF requests and monitor logs for abnormal or repeated UDM provisioning calls that could indicate an attempted denial‑of‑service attack.

Generated by OpenCVE AI on May 1, 2026 at 22:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Open5GS up to 2.7.7. The impacted element is the function amf_nudm_sdm_handle_provisioned of the file /src/amf/nudm-handler.c of the component AMF. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS AMF nudm-handler.c amf_nudm_sdm_handle_provisioned denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T17:50:33.617Z

Reserved: 2026-05-01T08:07:13.572Z

Link: CVE-2026-7585

cve-icon Vulnrichment

Updated: 2026-05-01T17:50:25.314Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T16:16:33.490

Modified: 2026-05-01T20:22:29.633

Link: CVE-2026-7585

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T23:00:14Z

Weaknesses