CVE-2026-2523

A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/open5gs/open5gs/ Product
https://github.com/open5gs/open5gs/issues/4285 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4285#issue-3809055236 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.346111 Permissions Required VDB Entry
https://vuldb.com/?id.346111 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738342 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-16 01:15

Updated : 2026-02-18 19:07


NVD link : CVE-2026-2523

Mitre link : CVE-2026-2523

CVE.ORG link : CVE-2026-2523


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-617

Reachable Assertion