CVE-2026-2524

A flaw has been found in Open5GS 2.7.6. The impacted element is the function mme_s11_handle_create_session_response of the component MME. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/open5gs/open5gs/ Product
https://github.com/open5gs/open5gs/issues/4284 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4284#issue-3808462406 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.346112 Permissions Required VDB Entry
https://vuldb.com/?id.346112 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738369 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:2.7.6:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-16 01:15

Updated : 2026-02-18 19:07


NVD link : CVE-2026-2524

Mitre link : CVE-2026-2524

CVE.ORG link : CVE-2026-2524


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release