Impact
The flaw lies in the update_authorized_pcc_rule_and_qos function within the SMF component of Open5GS, allowing an attacker to send crafted requests that cause the service to crash. This is a classic resource exhaustion scenario covered by CWE‑404. The result is a denial of service that can disrupt the availability of the network signalling plane, but it does not directly compromise confidentiality or integrity.
Affected Systems
All installations of Open5GS up to version 2.7.7 are vulnerable. The specific part of the code affected is the SMF module, specifically the file src/smf/npcf-handler.c.
Risk and Exploitability
With a CVSS score of 5.3 the vulnerability is moderate in severity. The EPSS score is not available, and the flaw is currently not listed in the CISA KEV catalog. The attack can be launched remotely and the exploit is publicly available, meaning remote attackers could repeatedly trigger service crashes. While the vulnerability does not leak data, repeated denials can lead to significant operational impact.
OpenCVE Enrichment