Description
A flaw has been found in Open5GS up to 2.7.7. The affected element is the function nssf_nnrf_nsselection_handle_get_from_amf_or_vnssf of the file /src/nssf/nnssf-handler.c of the component NSSF. Executing a manipulation can lead to denial of service. The attack can be executed remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw exists in the Open5GS NSSF component within the function nssf_nnrf_nsselection_handle_get_from_amf_or_vnssf that allows an attacker to send a crafted request and trigger a crash, leading to a loss of availability for the network element. The vulnerability is explicitly stated as a denial of service and the exploit can be performed remotely. The description confirms that an exploit has already been published and may be used in the wild.

Affected Systems

Versions of Open5GS up to and including 2.7.7 contain the vulnerable NSSF module. Systems running these builds are directly impacted, while newer releases are presumed to contain the fix although no official confirmation is provided.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score is not available, providing no quantified probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Because the attack vector is remote, an adversary only needs network access to the NSSF service to trigger a denial of service. The publicly available exploit raises the risk of real‑world attacks.

Generated by OpenCVE AI on May 8, 2026 at 03:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a Open5GS version that includes the NSSF fix once the vendor releases one.
  • Configure firewall rules or network segmentation to restrict external access to the NSSF service, thereby reducing the attack surface.
  • Monitor NSSF logs for crash attempts; consider disabling the NSSF service temporarily until an official patch is applied.

Generated by OpenCVE AI on May 8, 2026 at 03:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 01:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Open5GS up to 2.7.7. The affected element is the function nssf_nnrf_nsselection_handle_get_from_amf_or_vnssf of the file /src/nssf/nnssf-handler.c of the component NSSF. Executing a manipulation can lead to denial of service. The attack can be executed remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS NSSF nnssf-handler.c denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-08T00:15:09.713Z

Reserved: 2026-05-07T16:56:44.589Z

Link: CVE-2026-8120

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T01:16:09.643

Modified: 2026-05-08T01:16:09.643

Link: CVE-2026-8120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T03:30:44Z

Weaknesses