Description
A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function ogs_gtp2_parse_bearer_qos in the library lib/gtp/v2/types.c of the component Bearer QoS IE Length Handler. Performing manipulation results in denial of service. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is named 4e913d21f2c032b187815f063dbab5ebe65fe83a. To fix this issue, it is recommended to deploy a patch.
Problem types
Timeline
| 2026-01-01: | Advisory disclosed |
| 2026-01-01: | VulDB entry created |
| 2026-01-01: | VulDB entry last update |
Credits
LinZiyu (VulDB User)
References
vuldb.com/?id.339340 (VDB-339340 | Open5GS Bearer QoS IE Length types.c ogs_gtp2_parse_bearer_qos denial of service)
vuldb.com/?ctiid.339340 (VDB-339340 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.728043 (Submit #728043 | Open5GS SGWC v2.7.6 Denial of Service)
github.com/open5gs/open5gs/issues/4217
github.com/open5gs/open5gs/issues/4217
github.com/open5gs/open5gs/issues/4217
github.com/...ommit/4e913d21f2c032b187815f063dbab5ebe65fe83a
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.