CVE-2026-1521: Denial of Service in Open5GS
A security flaw has been discovered in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_bearer_resource_failure_indication of the file src/sgwc/s5c-handler.c of the component SGWC. Performing a manipulation results in denial of service. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 69b53add90a9479d7960b822fc60601d659c328b. It is recommended to apply a patch to fix this issue.
AI Analysis
Technical Summary
CVE-2026-1521 is a denial of service vulnerability affecting Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The vulnerability resides in the SGWC (Serving Gateway Control) component, specifically within the function sgwc_s5c_handle_bearer_resource_failure_indication located in src/sgwc/s5c-handler.c. This function handles bearer resource failure indications on the S5-C interface, which is critical for managing bearer contexts between the Serving Gateway and the Packet Data Network Gateway. An attacker can remotely send specially crafted messages that manipulate this function's processing logic, causing the SGWC process to crash or become unresponsive, resulting in denial of service. The vulnerability requires no authentication, no user interaction, and can be exploited over the network, making it accessible to remote attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network vector, low attack complexity, and no privileges required. The impact is primarily on availability, potentially disrupting 5G core network operations and affecting subscriber connectivity. Although no active exploitation has been reported, a public exploit is available, increasing the risk of future attacks. The issue affects Open5GS versions 2.7.0 through 2.7.6. The Open5GS project has released a patch identified by commit 69b53add90a9479d7960b822fc60601d659c328b to remediate the vulnerability. Organizations running vulnerable versions should apply this patch immediately to prevent service disruption.
Potential Impact
For European organizations, particularly telecom operators and mobile service providers deploying Open5GS as part of their 5G core network infrastructure, this vulnerability poses a significant risk to network availability. A successful denial of service attack could disrupt subscriber services, degrade network performance, and cause outages affecting voice, data, and emergency communications. This disruption could lead to customer dissatisfaction, regulatory scrutiny, and financial losses. Given the critical role of 5G networks in supporting IoT, smart city applications, and industrial automation across Europe, the impact extends beyond traditional telecom services. Additionally, national security agencies and critical infrastructure operators relying on 5G connectivity could face operational challenges. The remote and unauthenticated nature of the exploit increases the threat landscape, as attackers do not need insider access. Although no known exploitation in the wild has been reported, the public availability of an exploit increases the urgency for mitigation. The medium severity rating indicates a moderate but actionable risk that must be addressed promptly to maintain network resilience.
Mitigation Recommendations
1. Immediately apply the official patch released by the Open5GS project, identified by commit 69b53add90a9479d7960b822fc60601d659c328b, to all affected Open5GS deployments running versions 2.7.0 through 2.7.6. 2. Implement network-level filtering and anomaly detection on the S5-C interface to monitor and block malformed or suspicious bearer resource failure indication messages. 3. Employ strict access controls and segmentation for the 5G core network components to limit exposure to untrusted networks and reduce the attack surface. 4. Conduct regular vulnerability assessments and penetration testing focused on 5G core network elements to identify and remediate similar issues proactively. 5. Maintain up-to-date incident response plans tailored to 5G network disruptions, including rapid rollback or failover procedures. 6. Collaborate with vendors and the open-source community to stay informed about emerging threats and patches related to Open5GS and 5G core technologies. 7. Consider deploying redundancy and load balancing for SGWC components to mitigate the impact of potential DoS attacks. 8. Educate network operations teams on the specific indicators of compromise related to this vulnerability to enable early detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2026-1521: Denial of Service in Open5GS
Description
A security flaw has been discovered in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_bearer_resource_failure_indication of the file src/sgwc/s5c-handler.c of the component SGWC. Performing a manipulation results in denial of service. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 69b53add90a9479d7960b822fc60601d659c328b. It is recommended to apply a patch to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-1521 is a denial of service vulnerability affecting Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The vulnerability resides in the SGWC (Serving Gateway Control) component, specifically within the function sgwc_s5c_handle_bearer_resource_failure_indication located in src/sgwc/s5c-handler.c. This function handles bearer resource failure indications on the S5-C interface, which is critical for managing bearer contexts between the Serving Gateway and the Packet Data Network Gateway. An attacker can remotely send specially crafted messages that manipulate this function's processing logic, causing the SGWC process to crash or become unresponsive, resulting in denial of service. The vulnerability requires no authentication, no user interaction, and can be exploited over the network, making it accessible to remote attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network vector, low attack complexity, and no privileges required. The impact is primarily on availability, potentially disrupting 5G core network operations and affecting subscriber connectivity. Although no active exploitation has been reported, a public exploit is available, increasing the risk of future attacks. The issue affects Open5GS versions 2.7.0 through 2.7.6. The Open5GS project has released a patch identified by commit 69b53add90a9479d7960b822fc60601d659c328b to remediate the vulnerability. Organizations running vulnerable versions should apply this patch immediately to prevent service disruption.
Potential Impact
For European organizations, particularly telecom operators and mobile service providers deploying Open5GS as part of their 5G core network infrastructure, this vulnerability poses a significant risk to network availability. A successful denial of service attack could disrupt subscriber services, degrade network performance, and cause outages affecting voice, data, and emergency communications. This disruption could lead to customer dissatisfaction, regulatory scrutiny, and financial losses. Given the critical role of 5G networks in supporting IoT, smart city applications, and industrial automation across Europe, the impact extends beyond traditional telecom services. Additionally, national security agencies and critical infrastructure operators relying on 5G connectivity could face operational challenges. The remote and unauthenticated nature of the exploit increases the threat landscape, as attackers do not need insider access. Although no known exploitation in the wild has been reported, the public availability of an exploit increases the urgency for mitigation. The medium severity rating indicates a moderate but actionable risk that must be addressed promptly to maintain network resilience.
Mitigation Recommendations
1. Immediately apply the official patch released by the Open5GS project, identified by commit 69b53add90a9479d7960b822fc60601d659c328b, to all affected Open5GS deployments running versions 2.7.0 through 2.7.6. 2. Implement network-level filtering and anomaly detection on the S5-C interface to monitor and block malformed or suspicious bearer resource failure indication messages. 3. Employ strict access controls and segmentation for the 5G core network components to limit exposure to untrusted networks and reduce the attack surface. 4. Conduct regular vulnerability assessments and penetration testing focused on 5G core network elements to identify and remediate similar issues proactively. 5. Maintain up-to-date incident response plans tailored to 5G network disruptions, including rapid rollback or failover procedures. 6. Collaborate with vendors and the open-source community to stay informed about emerging threats and patches related to Open5GS and 5G core technologies. 7. Consider deploying redundancy and load balancing for SGWC components to mitigate the impact of potential DoS attacks. 8. Educate network operations teams on the specific indicators of compromise related to this vulnerability to enable early detection and response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-28T10:11:36.410Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697a37694623b1157cd7577e
Added to database: 1/28/2026, 4:20:57 PM
Last enriched: 1/28/2026, 4:35:17 PM
Last updated: 2/6/2026, 12:41:42 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumLiving off the AI: The Next Evolution of Attacker Tradecraft
MediumFlickr Security Incident Tied to Third-Party Email System
MediumCVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.