Description
A vulnerability has been found in Open5GS up to 2.7.6. Affected is an unknown function of the file src/amf/gmm-handler.c of the component AMF. The manipulation of the argument reg_type leads to denial of service. The attack is possible to be carried out remotely. Upgrading to version 2.7.7 is able to address this issue. The identifier of the patch is ebc66942b6f8f1fab2d640e71cf4e9f1a423b426. It is advisable to upgrade the affected component.
Published: 2026-05-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Open5GS AMF component, located in src/amf/gmm-handler.c, allows an attacker to supply a crafted reg_type value that causes the process to crash, resulting in a denial of service. The weakness is a missing error check for a user‑supplied argument, formally identified as CWE‑404.

Affected Systems

The vulnerability exists in all Open5GS releases up to and including 2.7.6. The affected product is the AMF module of Open5GS; upgrading to version 2.7.7, which incorporates the commit ebc66942b6f8f1fab2d640e71cf4e9f1a423b426, resolves the issue.

Risk and Exploitability

The CVSS score of 5.3 represents moderate severity; no EPSS score is reported and the flaw is not listed in CISA’s KEV catalog. Exploitation can be performed remotely, and repeated attacks could repeatedly crash the AMF process, degrading availability for all users of the affected instance.

Generated by OpenCVE AI on May 2, 2026 at 11:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to version 2.7.7 or later, which includes the fix carried out in commit ebc66942b6f8f1fab2d640e71cf4e9f1a423b426.
  • If an upgrade cannot be performed immediately, isolate the AMF component from the network to limit external exposure and monitor inbound traffic for attempts to manipulate reg_type values.
  • Configure firewall rules or access control lists to restrict incoming connections to the AMF A interface to trusted IP ranges until the patch is applied.

Generated by OpenCVE AI on May 2, 2026 at 11:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Open5GS up to 2.7.6. Affected is an unknown function of the file src/amf/gmm-handler.c of the component AMF. The manipulation of the argument reg_type leads to denial of service. The attack is possible to be carried out remotely. Upgrading to version 2.7.7 is able to address this issue. The identifier of the patch is ebc66942b6f8f1fab2d640e71cf4e9f1a423b426. It is advisable to upgrade the affected component.
Title Open5GS AMF gmm-handler.c denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-02T02:00:17.083Z

Reserved: 2026-05-01T11:50:20.513Z

Link: CVE-2026-7601

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T03:15:59.997

Modified: 2026-05-02T03:15:59.997

Link: CVE-2026-7601

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T11:45:41Z

Weaknesses