Description
A vulnerability was detected in Open5GS up to 2.7.7. This affects the function gsm_build_pdu_session_establishment_accept of the file /src/smf/gsm-build.c of the component SMF. The manipulation results in denial of service. The attack can be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An attacker can manipulate packets sent to the SMF to trigger a crash in the gsm_build_pdu_session_establishment_accept function. The flaw is present in Open5GS releases through version 2.7.7 and is classified as a CWE‑404 vulnerability, indicating an improper resource shutdown or release. When the function is invoked with crafted input it leads to a denial of service of the SMF, effectively disrupting session management for affected users. The vulnerability is remote‑accessible, the exploit is publicly available, and no official patch from the vendor has yet been released at the time of discovery.

Affected Systems

The vulnerability targets the Open5GS SMF component used in 5G core networks. All deployments running Open5GS SMF that have not applied a fix before version 2.7.7 are affected. The product is Open5GS, the vendor is Open5GS, and the specific source file is /src/smf/gsm-build.c with the vulnerable function gsm_build_pdu_session_establishment_accept.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, reflecting a medium impact on availability. EPSS data is not available, so the exact likelihood of exploitation remains uncertain, but the existence of a public exploit and the ability to launch the attack remotely suggest a non‑negligible risk. The flaw is not listed in the CISA KEV catalog. An attacker could orchestrate widespread disruptions by targeting the SMF, potentially affecting many users or entire network slices. The combination of moderate severity and remote availability warrants proactive mitigation.

Generated by OpenCVE AI on May 11, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to the latest release that patches the gsm_build_pdu_session_establishment_accept function.
  • Restrict external access to the SMF by applying firewall rules or network segmentation to limit connections to trusted networks.
  • Implement automated monitoring and service restarts for the SMF to reduce downtime from unexpected crashes.

Generated by OpenCVE AI on May 11, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Open5GS up to 2.7.7. This affects the function gsm_build_pdu_session_establishment_accept of the file /src/smf/gsm-build.c of the component SMF. The manipulation results in denial of service. The attack can be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS SMF gsm-build.c gsm_build_pdu_session_establishment_accept denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T02:45:08.137Z

Reserved: 2026-05-10T15:44:24.038Z

Link: CVE-2026-8266

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T04:16:20.060

Modified: 2026-05-11T15:10:16.663

Link: CVE-2026-8266

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T04:30:27Z

Weaknesses