Description
A flaw has been found in Open5GS up to 2.7.7. The impacted element is the function update_authorized_pcc_rule_and_qos of the file /src/smf/npcf-handler.c of the component SMF. This manipulation causes denial of service. Remote exploitation of the attack is possible. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw exists in the Open5GS Session Management Function (SMF) component within the /src/smf/npcf-handler.c file, specifically in the update_authorized_pcc_rule_and_qos function. The defect allows a remote attacker to trigger a denial of service by manipulating the authorized packet‑correlation rules and QoS settings. When the function mismanages references, the SMF process terminates or freezes, resulting in a loss of service availability. The weakness is identified as CWE‑404, indicating a missing or improper reference handling issue.

Affected Systems

All installations of Open5GS up to and including version 2.7.7 are affected. This includes deployments where the SMF module handles NpCf traffic for packet‑correlation rules management. No known fix exists in released versions through 2.7.7, and the maintainers have not yet published a patch evident in the provided references.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity, but the official details confirm remote exploitation is possible and an exploit has been published. Although the EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, the presence of proof‑of‑concept code in public repositories suggests that the likelihood of exploitation may be higher than the base score implies. Operators should consider the risk notable, as an attacker could disrupt service availability on exposed Open5GS instances.

Generated by OpenCVE AI on May 11, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to a release later than 2.7.7 that contains the fix (e.g., 2.7.8 or newer).
  • Restrict network access to the SMF NpCf API endpoints to trusted internal networks or specific IP ranges to reduce the attack surface.
  • Monitor SMF logs and network traffic for repeated or suspicious update_authorized_pcc_rule_and_qos requests, and alert operators to potential abuse.

Generated by OpenCVE AI on May 11, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 10 May 2026 23:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Open5GS up to 2.7.7. The impacted element is the function update_authorized_pcc_rule_and_qos of the file /src/smf/npcf-handler.c of the component SMF. This manipulation causes denial of service. Remote exploitation of the attack is possible. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS SMF npcf-handler.c update_authorized_pcc_rule_and_qos denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T14:31:40.932Z

Reserved: 2026-05-10T14:39:59.197Z

Link: CVE-2026-8249

cve-icon Vulnrichment

Updated: 2026-05-11T14:31:03.655Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-10T23:16:27.243

Modified: 2026-05-11T15:10:16.663

Link: CVE-2026-8249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T01:30:25Z

Weaknesses