Description
A vulnerability was detected in Open5GS up to 2.7.7. The affected element is the function update_authorized_pcc_rule_and_qos of the file /src/smf/npcf-handler.c of the component SMF. The manipulation results in denial of service. The attack may be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw lies in the update_authorized_pcc_rule_and_qos function within the SMF component of Open5GS, allowing an attacker to send crafted requests that cause the service to crash. This is a classic resource exhaustion scenario covered by CWE‑404. The result is a denial of service that can disrupt the availability of the network signalling plane, but it does not directly compromise confidentiality or integrity.

Affected Systems

All installations of Open5GS up to version 2.7.7 are vulnerable. The specific part of the code affected is the SMF module, specifically the file src/smf/npcf-handler.c.

Risk and Exploitability

With a CVSS score of 5.3 the vulnerability is moderate in severity. The EPSS score is not available, and the flaw is currently not listed in the CISA KEV catalog. The attack can be launched remotely and the exploit is publicly available, meaning remote attackers could repeatedly trigger service crashes. While the vulnerability does not leak data, repeated denials can lead to significant operational impact.

Generated by OpenCVE AI on May 10, 2026 at 23:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Open5GS release that contains the fix for the SMF NPCH handler.
  • If an immediate upgrade is not possible, restrict or rate‑limit traffic to the SMF NPCH endpoint to mitigate abuse until the patch is applied.
  • Implement automated monitoring and recovery (e.g., process watchdog or container restart) to minimise downtime caused by unexpected crashes.

Generated by OpenCVE AI on May 10, 2026 at 23:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Open5GS up to 2.7.7. The affected element is the function update_authorized_pcc_rule_and_qos of the file /src/smf/npcf-handler.c of the component SMF. The manipulation results in denial of service. The attack may be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS SMF npcf-handler.c update_authorized_pcc_rule_and_qos denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-10T22:15:10.574Z

Reserved: 2026-05-10T14:39:56.367Z

Link: CVE-2026-8248

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-10T23:16:27.057

Modified: 2026-05-11T15:10:16.663

Link: CVE-2026-8248

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T23:30:22Z

Weaknesses