Vulnerability Description
A vulnerability was determined in omec-project amf up to 2.1.3-dev. Impacted is the function NGSetupRequest of the file ngap/handler.go. Executing a manipulation of the argument InformationElement can lead to memory corruption. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.2.0 is recommended to address this issue. The affected component should be upgraded. The same pull request fixes multiple security issues.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/omec-project/amf/
- https://github.com/omec-project/amf/issues/671
- https://github.com/omec-project/amf/pull/666
- https://github.com/omec-project/amf/releases/tag/v2.2.0
- https://vuldb.com/submit/811616
- https://vuldb.com/vuln/364403
- https://vuldb.com/vuln/364403/cti
FAQ
What is CVE-2026-8779?
CVE-2026-8779 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability was determined in omec-project amf up to 2.1.3-dev. Impacted is the function NGSetupRequest of the file ngap/handler.go. Executing a manipulation of the argument InformationElement can...
How severe is CVE-2026-8779?
CVE-2026-8779 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8779?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.