Home

Description

A vulnerability was determined in Open5GS up to 2.7.7. This affects the function gsm_handle_pdu_session_modification_qos_flow_descriptions of the file src/smf/gsm-handler.c of the component SMF. Executing a manipulation of the argument n1SmMsg can lead to denial of service. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The pull request to fix this issue awaits acceptance.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-11 | Updated 2026-05-11 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:C
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:C
4.0AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:C

Problem types

Denial of Service

Timeline

2026-05-11:Advisory disclosed
2026-05-11:VulDB entry created
2026-05-11:VulDB entry last update

Credits

FrankLin (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/362585 (VDB-362585 | Open5GS SMF gsm-handler.c denial of service) vdb-entry technical-description

vuldb.com/vuln/362585/cti (VDB-362585 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/808489 (Submit #808489 | Open5gs SMF v2.7.7 Denial of Service) third-party-advisory

github.com/open5gs/open5gs/issues/4452 exploit issue-tracking

github.com/open5gs/open5gs/pull/4513 issue-tracking patch

github.com/open5gs/open5gs/ product

cve.org (CVE-2026-8288)

nvd.nist.gov (CVE-2026-8288)

Download JSON