Home

Description

A vulnerability has been found in Open5GS up to 2.7.6. Affected is an unknown function of the file src/amf/gmm-handler.c of the component AMF. The manipulation of the argument reg_type leads to denial of service. The attack is possible to be carried out remotely. Upgrading to version 2.7.7 is able to address this issue. The identifier of the patch is ebc66942b6f8f1fab2d640e71cf4e9f1a423b426. It is advisable to upgrade the affected component.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-02 | Updated 2026-05-04 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C
4.0AV:N/AC:L/Au:S/C:N/I:N/A:P/E:ND/RL:OF/RC:C

Problem types

Denial of Service

Timeline

2026-05-01:Advisory disclosed
2026-05-01:VulDB entry created
2026-05-04:VulDB entry last update

Credits

Luca Jungnickel (Fraunhofer FOKUS) finder

Karsten Isakovic (Fraunhofer FOKUS) finder

jungnickel (VulDB User) reporter

jungnickel (VulDB User) analyst

References

vuldb.com/vuln/360558 (VDB-360558 | Open5GS AMF gmm-handler.c denial of service) vdb-entry technical-description

vuldb.com/vuln/360558/cti (VDB-360558 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/805675 (Submit #805675 | Open5GS v.2.7.6 Denial of Service) third-party-advisory

github.com/open5gs/open5gs/issues/4321 issue-tracking

github.com/...ommit/ebc66942b6f8f1fab2d640e71cf4e9f1a423b426 patch

github.com/open5gs/open5gs/releases/tag/v2.7.7 patch

github.com/open5gs/open5gs/ product

cve.org (CVE-2026-7601)

nvd.nist.gov (CVE-2026-7601)

Download JSON