Description
A vulnerability has been found in Open5GS up to 2.7.7. This issue affects the function OpenAPI_list_create of the component SMF. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the OpenAPI_list_create function of the Open5GS SMF component. Manipulation of this endpoint can cause the service to become unavailable, resulting in a denial of service that affects all users relying on the affected SMF instance. The weakness is classified as CWE-404, indicating a defect related to resource access or missing validation, and the CVSS score of 5.3 reflects a moderate severity of the impact.

Affected Systems

This flaw touches Open5GS products through version 2.7.7 inclusive. The SMF (Serving Gateway) portion of the Open5GS suite is implicated, and any deployment using these versions is susceptible. No more granular version information is available beyond the upper bound of 2.7.7. Managers of Open5GS installations should verify that their instances fall within this range.

Risk and Exploitability

The attack appears to be launched remotely, as the public exploit details reference remote manipulation of the API endpoint. However, the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, implying no confirmed mass exploitation yet. The publicly disclosed nature of the exploit adds a risk that attackers may discover and utilize the flaw before an official fix is delivered, especially if the SMF endpoint is exposed to the internet. Overall, the moderate CVSS score and lack of mitigation from the maintainers suggest that the vulnerability poses a tangible threat to the availability of the affected service.

Generated by OpenCVE AI on May 11, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact Open5GS maintainers to obtain an official patch or an interim fix
  • Limit external access to the SMF OpenAPI endpoints by firewalling or network segmentation
  • Implement rate limiting and monitor API traffic for anomalous requests to detect and mitigate attempts to trigger the denial of service

Generated by OpenCVE AI on May 11, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Open5GS up to 2.7.7. This issue affects the function OpenAPI_list_create of the component SMF. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS SMF OpenAPI_list_create denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T14:02:09.468Z

Reserved: 2026-05-10T15:44:29.039Z

Link: CVE-2026-8268

cve-icon Vulnrichment

Updated: 2026-05-11T14:02:05.678Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T04:16:20.403

Modified: 2026-05-11T15:10:16.663

Link: CVE-2026-8268

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T05:15:28Z

Weaknesses