Vulnerability Description
A vulnerability was detected in Open5GS up to 2.7.7. This affects the function gsm_build_pdu_session_establishment_accept of the file /src/smf/gsm-build.c of the component SMF. The manipulation results in denial of service. The attack can be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open5Gs | Open5Gs | <= 2.7.7 |
Related Weaknesses (CWE)
References
- https://github.com/open5gs/open5gs/Product
- https://github.com/open5gs/open5gs/issues/4447ExploitIssue Tracking
- https://vuldb.com/submit/808483Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362563Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362563/ctiPermissions RequiredVDB Entry
FAQ
What is CVE-2026-8266?
CVE-2026-8266 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability was detected in Open5GS up to 2.7.7. This affects the function gsm_build_pdu_session_establishment_accept of the file /src/smf/gsm-build.c of the component SMF. The manipulation result...
How severe is CVE-2026-8266?
CVE-2026-8266 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8266?
Check the references section above for vendor advisories and patch information. Affected products include: Open5Gs Open5Gs.