Description
A flaw has been found in Open5GS up to 2.7.7. This issue affects the function bsf_sess_find_by_ipv6prefix of the file /src/bsf/context.c of the component BSF. This manipulation of the argument ipv6Prefix causes denial of service. It is possible to initiate the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Timeline
| 2026-05-01: | Advisory disclosed |
| 2026-05-01: | VulDB entry created |
| 2026-05-01: | VulDB entry last update |
Credits
ZiyuLin (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/360530 (VDB-360530 | Open5GS BSF context.c bsf_sess_find_by_ipv6prefix denial of service)
vuldb.com/vuln/360530/cti (VDB-360530 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/804322 (Submit #804322 | Open5gs BSF v2.7.7 Denial of Service)
github.com/open5gs/open5gs/issues/4401
github.com/open5gs/open5gs/