Description
A weakness has been identified in Open5GS up to 2.7.7. Impacted is the function ogs_nnrf_nfm_handle_nf_profile of the file lib/sbi/nnrf-handler.c of the component NRF. This manipulation causes denial of service. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The pull request to fix this issue awaits acceptance.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in Open5GS’s NRF component stems from the ogs_nnrf_nfm_handle_nf_profile function in lib/sbi/nnrf-handler.c. Manipulation of this function leads to a denial of service, allowing an attacker to interrupt NRF operation. The weakness is a missing resource reset issue, identified as CWE‑404, and an exploit is publicly available.

Affected Systems

Open5GS, versions up to 2.7.7. Deployments using the NRF service, particularly those exposing nf_profile interfaces, are susceptible until the functionality is patched or removed.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the lack of an EPSS score suggests the exploitation probability is unknown. The vulnerability is not listed in the CISA KEV catalog, but because the attack vector is remote and an exploit is available, the risk remains non‑trivial for exposed systems.

Generated by OpenCVE AI on May 11, 2026 at 17:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the pending patch manually by reviewing and merging pull request 4534 into the Open5GS codebase.
  • If a patch cannot be applied immediately, restrict or block access to the NRF nf_profile API endpoints to eliminate the attack surface.
  • Continuously monitor Open5GS security advisories and apply an official patch as soon as it is released.

Generated by OpenCVE AI on May 11, 2026 at 17:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Open5GS up to 2.7.7. Impacted is the function ogs_nnrf_nfm_handle_nf_profile of the file lib/sbi/nnrf-handler.c of the component NRF. This manipulation causes denial of service. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The pull request to fix this issue awaits acceptance.
Title Open5GS NRF nnrf-handler.c ogs_nnrf_nfm_handle_nf_profile denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T15:54:10.549Z

Reserved: 2026-05-11T08:02:19.004Z

Link: CVE-2026-8291

cve-icon Vulnrichment

Updated: 2026-05-11T15:54:05.356Z

cve-icon NVD

Status : Received

Published: 2026-05-11T16:17:43.403

Modified: 2026-05-11T16:17:43.403

Link: CVE-2026-8291

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T19:15:42Z

Weaknesses