Vulnerability Description
A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open5Gs | Open5Gs | < 2.7.6 |
Related Weaknesses (CWE)
References
- https://github.com/open5gs/open5gs/
- https://github.com/open5gs/open5gs/issues/4273ExploitIssue TrackingVendor Advisory
- https://github.com/open5gs/open5gs/issues/4273#event-21968643659ExploitIssue TrackingVendor Advisory
- https://github.com/open5gs/open5gs/issues/4273#issue-3796030721ExploitIssue TrackingVendor Advisory
- https://vuldb.com/?ctiid.343349Permissions RequiredVDB Entry
- https://vuldb.com/?id.343349Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.738375ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2026-1586?
CVE-2026-1586 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of servi...
How severe is CVE-2026-1586?
CVE-2026-1586 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1586?
Check the references section above for vendor advisories and patch information. Affected products include: Open5Gs Open5Gs.