Description
A vulnerability was identified in Open5GS up to 2.7.7. This vulnerability affects the function smf_nsmf_handle_update_data_in_vsmf of the file /src/smf/nsmf-handler.c of the component SMF. The manipulation of the argument qosFlowProfile leads to denial of service. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open5GS versions up to 2.7.7 contain a flaw in the SMF component’s smf_nsmf_handle_update_data_in_vsmf function, where an attacker can manipulate the qosFlowProfile argument sent from a VSMF. This manipulation triggers a crash in the SMF process, causing a denial of service that can be triggered remotely. The flaw is publicly documented and may already be weaponized. The nature of the weakness is a missing input validation or handling failure, identified as CWE-404.

Affected Systems

Any installation of Open5GS running SMF before version 2.7.8 is affected. The flaw exists in the file src/smf/nsmf-handler.c, specifically the smf_nsmf_handle_update_data_in_vsmf routine. This applies to all platforms where Open5GS is deployed as the core network SMF function, including telecom operators or research environments using the open source package.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate impact; however, the exploit is remote, publicly available, and could disrupt service availability. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog. An attacker with network access to a VSMF that communicates with the SMF could craft a malicious qosFlowProfile payload to force the SMF to restart, leading to a denial of service that might affect data connectivity for end users. The risk remains clinically significant because it targets a critical control plane element of 5G networks.

Generated by OpenCVE AI on May 11, 2026 at 17:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open5GS to version 2.7.8 or later, which removes the vulnerable code
  • Modify the SMF source to validate qosFlowProfile input, ensuring it is not null and is within expected bounds before processing
  • Segment the network so that only trusted VSMF entities can reach the SMF and monitor SMF logs for abnormal update attempts to detect attempts to trigger the crash

Generated by OpenCVE AI on May 11, 2026 at 17:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Open5GS up to 2.7.7. This vulnerability affects the function smf_nsmf_handle_update_data_in_vsmf of the file /src/smf/nsmf-handler.c of the component SMF. The manipulation of the argument qosFlowProfile leads to denial of service. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS SMF nsmf-handler.c smf_nsmf_handle_update_data_in_vsmf denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T12:30:10.974Z

Reserved: 2026-05-11T08:02:12.966Z

Link: CVE-2026-8289

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T14:16:34.207

Modified: 2026-05-11T15:10:16.663

Link: CVE-2026-8289

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:45:26Z

Weaknesses