Impact
The vulnerability resides in the SMF component of Open5GS, specifically in smf_n4_build_qos_flow_to_modify_list. Manipulation of this function can lead to denial of service. The issue affects all Open5GS releases up to version 2.7.7 and can be executed remotely.
Affected Systems
All Open5GS deployments implementing the SMF component, versions 2.7.7 and earlier. The vendor is Open5GS and the product is the SMF module within the Open5GS 5G core network software.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity; EPSS is not available, and the vulnerability is not listed in CISA KEV, but the exploit is publicly disclosed and usable. The attack can be executed remotely and leads to denial of service. Without a patch, the risk remains unless mitigated by limiting exposure.
OpenCVE Enrichment