Description
A security vulnerability has been detected in Open5GS up to 2.7.7. The affected element is the function yuarel_parse in the library /lib/sbi/conv.c of the component NRF. Such manipulation of the argument hnrf-uri leads to denial of service. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability in the yuarel_parse function within Open5GS's NRF component allows an attacker to craft malicious hnrf-uri arguments and trigger a denial of service in the NRF's SBI interface. The flaw, identified as CWE-404, arises from improper validation of the URI string, causing the process to crash when malformed data is received. Executing the exploit can liberate the NRF service to become unavailable, potentially disrupting network services for a user or operator while the affected system is still in the attacker's control.

Affected Systems

The issue affects Open5GS deployments up to version 2.7.7. Any installation using the NRF component on these releases is susceptible. The vulnerability resides in the /lib/sbi/conv.c library and can be triggered remotely by sending requests to the NRF's SBI endpoint with a crafted hnrf-uri parameter. No downstream products beyond Open5GS were identified at this time.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate impact. EPSS is currently unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been broadly exploited. Nevertheless, the attack vector is remote and the mitigation requires timely patching or mitigations. An attacker who can reach the NRF's SBI interface could repeatedly provoke service crashes, leading to disrupted network connectivity for connected devices.

Generated by OpenCVE AI on May 11, 2026 at 16:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Open5GS release that includes a fix for the yuarel_parse issue (consult vendor for distribution details).
  • Restrict access to the NRF’s SBI interface to trusted hosts or networks, and consider firewall rules to block repeated malformed requests.
  • Deploy monitoring to log and alert on repeated crashes or malformed hnrf-uri traffic, and isolate or restart the NRF service automatically when a crash is detected.

Generated by OpenCVE AI on May 11, 2026 at 16:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Open5GS up to 2.7.7. The affected element is the function yuarel_parse in the library /lib/sbi/conv.c of the component NRF. Such manipulation of the argument hnrf-uri leads to denial of service. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS NRF conv.c yuarel_parse denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T17:30:56.099Z

Reserved: 2026-05-11T08:02:21.794Z

Link: CVE-2026-8292

cve-icon Vulnrichment

Updated: 2026-05-11T16:05:59.299Z

cve-icon NVD

Status : Received

Published: 2026-05-11T16:17:43.557

Modified: 2026-05-11T16:17:43.557

Link: CVE-2026-8292

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:15:39Z

Weaknesses