Description
A flaw has been found in Open5GS up to 2.7.6. This impacts the function ogs_sbi_nf_instance_set_id in the library /lib/sbi/context.c of the component NRF. Executing a manipulation of the argument nfInstanceId can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the NRF component of Open5GS, affecting the function ogs_sbi_nf_instance_set_id in /lib/sbi/context.c, allows an attacker to manipulate the nfInstanceId argument, resulting in a denial of service. The weakness is classified as CWE-404. An affected system could become unavailable to legitimate users when the flaw is triggered, disrupting services that depend on the NRF for network function registration and discovery.

Affected Systems

The vulnerability impacts Open5GS deployments up to version 2.7.6. All supported releases up to that point are potentially affected unless a later version addresses the issue. Vendors and system administrators should verify the exact version in use.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity for denial of service. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is described as remote, meaning the exploitation can occur over a network connection. An exploit has been published, which may be used by threat actors to disrupt service availability. Because no official patch or workaround has yet been released, the risk remains unless mitigated through other controls.

Generated by OpenCVE AI on May 17, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch or update to a version that fixes the flaw as soon as it is released.
  • If no patch is yet available, isolate the NRF service by restricting network access—deploy firewall rules or network segmentation to limit which hosts or subnetworks can reach the NRF interface.
  • Monitor system logs and traffic for repeated or malformed nfInstanceId requests, and consider increasing the observation window or alert thresholds for potential denial-of-service activity.

Generated by OpenCVE AI on May 17, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 04:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Open5GS up to 2.7.6. This impacts the function ogs_sbi_nf_instance_set_id in the library /lib/sbi/context.c of the component NRF. Executing a manipulation of the argument nfInstanceId can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open5GS NRF context.c ogs_sbi_nf_instance_set_id denial of service
First Time appeared Open5gs
Open5gs open5gs
Weaknesses CWE-404
CPEs cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Vendors & Products Open5gs
Open5gs open5gs
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-17T03:45:09.083Z

Reserved: 2026-05-16T10:09:06.646Z

Link: CVE-2026-8730

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T05:16:16.570

Modified: 2026-05-17T05:16:16.570

Link: CVE-2026-8730

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T05:30:06Z

Weaknesses