Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1586: Denial of Service in Open5GS

0
Medium
VulnerabilityCVE-2026-1586cvecve-2026-1586
Published: Thu Jan 29 2026 (01/29/2026, 12:32:06 UTC)
Source: CVE Database V5
Product: Open5GS

Description

CVE-2026-1586 is a medium-severity denial of service vulnerability in Open5GS versions up to 2. 7. 5, specifically in the SGWC component's ogs_gtp2_f_teid_to_ip function. The flaw allows a remote attacker to cause a denial of service without requiring authentication or user interaction. The vulnerability has been fixed in later versions, and no known exploits are currently active in the wild. European organizations using Open5GS for 5G core network functions should apply patches promptly to prevent service disruption. The vulnerability's remote, unauthenticated nature increases its risk, particularly for telecom operators and infrastructure providers. Countries with significant 5G deployments and Open5GS adoption are at higher risk. Mitigation involves updating Open5GS to patched versions and monitoring network traffic for anomalous GTP messages targeting the SGWC. This vulnerability highlights the importance of securing 5G core components against protocol-level attacks.

AI-Powered Analysis

AILast updated: 01/29/2026, 15:42:12 UTC

Technical Analysis

CVE-2026-1586 is a vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw exists in the SGWC (Serving Gateway Control) component, specifically within the function ogs_gtp2_f_teid_to_ip located in the /sgwc/s11-handler.c source file. This function is responsible for handling GTP (GPRS Tunneling Protocol) messages, particularly mapping TEID (Tunnel Endpoint Identifier) values to IP addresses. Due to improper handling or validation of input data, an attacker can craft malicious GTP messages that exploit this flaw to trigger a denial of service (DoS) condition, causing the SGWC process to crash or become unresponsive. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its attack surface. Versions 2.7.0 through 2.7.5 of Open5GS are affected. The issue has been publicly disclosed and fixed in subsequent releases, though no active exploits have been reported in the wild. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of remote exploitation and the impact on availability. This vulnerability can disrupt 5G core network operations, potentially affecting mobile service continuity and reliability.

Potential Impact

For European organizations, especially telecom operators and 5G infrastructure providers, this vulnerability poses a risk of service disruption due to denial of service attacks on the SGWC component of Open5GS. A successful attack could lead to partial or full unavailability of 5G core network functions, impacting mobile subscribers and enterprise customers relying on 5G connectivity. This can result in degraded network performance, loss of revenue, and reputational damage. Critical services dependent on 5G, such as IoT deployments, smart city applications, and emergency communications, may also be affected. Given the remote and unauthenticated nature of the exploit, attackers could launch DoS attacks from outside the network perimeter, increasing the threat level. While no known exploits are currently active, the public disclosure and availability of proof-of-concept code raise the risk of future exploitation. Organizations operating Open5GS in Europe must prioritize patching to maintain network resilience and service continuity.

Mitigation Recommendations

1. Immediately upgrade Open5GS deployments to the latest patched version beyond 2.7.5 that addresses CVE-2026-1586. 2. Implement strict network filtering to block unauthorized or malformed GTP traffic at network boundaries, especially on interfaces exposed to untrusted networks. 3. Deploy anomaly detection systems to monitor GTP message patterns and identify suspicious TEID-to-IP mapping requests or malformed packets targeting SGWC. 4. Segment 5G core network components to limit lateral movement and isolate critical functions from general network traffic. 5. Regularly audit and update Open5GS configurations to follow security best practices, including minimizing exposed services and interfaces. 6. Establish incident response procedures specific to 5G core network disruptions to quickly identify and mitigate DoS events. 7. Collaborate with vendors and the open-source community to stay informed about emerging threats and patches related to Open5GS.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-29T05:57:08.622Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697b7c74ac0632022298179e

Added to database: 1/29/2026, 3:27:48 PM

Last enriched: 1/29/2026, 3:42:12 PM

Last updated: 1/29/2026, 5:12:36 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats