Impact
A manipulation of the argument service-names/snssais in the Open5GS NRF message.c library triggers a denial of service, allowing a remote attacker to crash the component. The vulnerability is present in all releases up to version 2.7.7 and the exploitation code is publicly available. The impact is a temporary loss of NRF functionality, which can ripple through the 5G core causing service interruption.
Affected Systems
The affected product is Open5GS, specifically the NRF component in the /lib/sbi/message.c module. All Open5GS versions up to and including 2.7.7 are vulnerable. Systems running these releases are at risk if the NRF service is exposed to untrusted networks.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, but the exploit is remote and public, making the likelihood of a successful attack significant despite the lack of an EPSS score. The vulnerability is not listed in the CISA KEV catalogue, yet the public availability of the exploit calls for vigilant monitoring until an official patch is released.
OpenCVE Enrichment