Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1586: Denial of Service in Open5GS

0
Medium
VulnerabilityCVE-2026-1586cvecve-2026-1586
Published: Thu Jan 29 2026 (01/29/2026, 12:32:06 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:35:24 UTC

Technical Analysis

CVE-2026-1586 identifies a denial of service (DoS) vulnerability in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The vulnerability resides in the ogs_gtp2_f_teid_to_ip function within the SGWC (Serving Gateway Control) component, specifically in the s11-handler.c source file. This function is responsible for translating GTP (GPRS Tunneling Protocol) Tunnel Endpoint Identifiers (TEIDs) to IP addresses during signaling message processing. Improper handling or validation of manipulated input data can cause the function to malfunction, leading to a crash or hang of the SGWC process. The attack vector is remote and does not require any authentication or user interaction, making exploitation relatively straightforward for an attacker with network access to the affected component. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and lack of required privileges, but limited to availability impact only. The vulnerability affects Open5GS versions 2.7.0 through 2.7.5 and has been addressed in subsequent releases. While no active exploitation has been reported, a proof-of-concept exploit is publicly available, increasing the risk of future attacks. Open5GS is commonly deployed by telecom operators and enterprises implementing private 5G networks, making this vulnerability relevant to critical telecommunications infrastructure.

Potential Impact

The primary impact of CVE-2026-1586 is denial of service, which can disrupt the availability of the 5G core network components relying on Open5GS. This disruption can cause service outages, dropped connections, and degraded network performance for end users. For telecom operators, this can translate into customer dissatisfaction, regulatory penalties, and financial losses. Enterprises using Open5GS for private 5G networks may experience operational interruptions affecting business-critical applications. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks from within or near the network perimeter, potentially causing widespread service degradation. The scope is limited to availability, with no direct confidentiality or integrity compromise reported. However, prolonged outages in 5G core infrastructure can indirectly affect other dependent services and emergency communications. The presence of a public exploit increases the urgency to remediate before attackers weaponize the flaw.

Mitigation Recommendations

Organizations should immediately upgrade Open5GS to the latest version that includes the patch for CVE-2026-1586. If immediate upgrade is not feasible, applying any available vendor-provided patches or workarounds is critical. Network administrators should implement strict filtering and validation of GTP traffic, especially on the S11 interface, to block malformed or suspicious packets that could trigger the vulnerability. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this exploit can help detect and mitigate attack attempts. Network segmentation and limiting access to the SGWC component to trusted sources reduce exposure. Monitoring system logs and network traffic for anomalies related to GTP signaling can provide early warning of exploitation attempts. Regular security assessments and penetration testing of 5G core components are recommended to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-29T05:57:08.622Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697b7c74ac0632022298179e

Added to database: 1/29/2026, 3:27:48 PM

Last enriched: 2/23/2026, 10:35:24 PM

Last updated: 3/25/2026, 3:10:43 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses