Vulnerability Description
A security vulnerability has been detected in Open5GS up to 2.7.7. The impacted element is the function ogs_sbi_discovery_option_parse_plmn_list in the library /lib/sbi/conv.c of the component NRF. Such manipulation of the argument target-plmn-list leads to denial of service. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open5Gs | Open5Gs | <= 2.7.7 |
Related Weaknesses (CWE)
References
- https://github.com/open5gs/open5gs/Product
- https://github.com/open5gs/open5gs/issues/4458ExploitIssue Tracking
- https://vuldb.com/submit/808510Third Party AdvisoryVDB Entry
- https://vuldb.com/submit/808511Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364317Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364317/ctiPermissions RequiredVDB Entry
FAQ
What is CVE-2026-8728?
CVE-2026-8728 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A security vulnerability has been detected in Open5GS up to 2.7.7. The impacted element is the function ogs_sbi_discovery_option_parse_plmn_list in the library /lib/sbi/conv.c of the component NRF. Su...
How severe is CVE-2026-8728?
CVE-2026-8728 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8728?
Check the references section above for vendor advisories and patch information. Affected products include: Open5Gs Open5Gs.