Vulnerability Description
A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open5Gs | Open5Gs | <= 2.7.6 |
Related Weaknesses (CWE)
References
- https://github.com/open5gs/open5gs/Product
- https://github.com/open5gs/open5gs/issues/4285ExploitIssue TrackingVendor Advisory
- https://github.com/open5gs/open5gs/issues/4285#issue-3809055236ExploitIssue TrackingVendor Advisory
- https://vuldb.com/?ctiid.346111Permissions RequiredVDB Entry
- https://vuldb.com/?id.346111Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.738342Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2523?
CVE-2026-2523 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulat...
How severe is CVE-2026-2523?
CVE-2026-2523 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2523?
Check the references section above for vendor advisories and patch information. Affected products include: Open5Gs Open5Gs.