Description
A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.
Problem types
Timeline
| 2026-01-16: | Advisory disclosed |
| 2026-01-16: | VulDB entry created |
| 2026-02-09: | VulDB entry last update |
Credits
ZiyuLin (VulDB User)
References
vuldb.com/?id.341596 (VDB-341596 | Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service)
vuldb.com/?ctiid.341596 (VDB-341596 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.728130 (Submit #728130 | Open5GS SGWC v2.7.6 Denial of Service)
vuldb.com/?submit.738372 (Submit #738372 | Open5GS SGWC v2.7.6 Denial of Service (Duplicate))
github.com/open5gs/open5gs/issues/4226
github.com/open5gs/open5gs/issues/4226
github.com/...ommit/b19cf6a2dbf5d30811be4488bf059c865bd7d1d2
github.com/open5gs/open5gs/