Description
A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion. The attack can be executed remotely. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
Problem types
Timeline
| 2026-02-01: | Advisory disclosed |
| 2026-02-01: | VulDB entry created |
| 2026-02-01: | VulDB entry last update |
Credits
ZiyuLin (VulDB User)
References
vuldb.com/?id.343637 (VDB-343637 | Open5GS SGWC context.c sgwc_tunnel_add assertion)
vuldb.com/?ctiid.343637 (VDB-343637 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.741193 (Submit #741193 | Open5gs SGWC v2.7.6 Denial of Service)
github.com/open5gs/open5gs/issues/4261
github.com/open5gs/open5gs/issues/4261
github.com/open5gs/open5gs/issues/4261
github.com/open5gs/open5gs/