Impact
A flaw in the authentication‑subscription Endpoint of Open5GS (udm_nudr_dr_handle_subscription_authentication) enables an attacker to trigger a denial of service by sending a crafted request. The vulnerability is exploitable remotely and an exploit has already been released to the public.
Affected Systems
All Open5GS deployments up to version 2.7.7 are affected, specifically the implementation in src/udm/nudr-handler.c that processes subscription authentication requests.
Risk and Exploitability
The CVSS score of 5.3 places the issue in the moderate impact range, and no EPSS score is available, but the remote nature of the attack and the public availability of the exploit raise the likelihood that vulnerable systems could be targeted. The vulnerability is not currently listed in CISA KEV, yet the potential for service disruption remains significant.
OpenCVE Enrichment