Impact
In Open5GS up to version 2.7.7 a flaw exists in the function ogs_sbi_discovery_option_add_service_names located in /lib/sbi/message.c of the NSSF component. By manipulating the input sent to this routine an attacker can cause the function to fail to release resources, leading to a denial of service. The vulnerability is classified under CWE‑404.
Affected Systems
The affected system is the Open5GS open5gs platform, specifically the NSSF service in all releases up to and including 2.7.7. Deployments of Open5GS using any of those versions are vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. Exploitation can be performed remotely and the exploit has been publicly released, so the risk of exploitation is real even though a formal EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog as of this analysis. The remote attack vector means that any externally reachable Open5GS deployment could be targeted without local access.
OpenCVE Enrichment