Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1587: Denial of Service in Open5GS

0
Medium
VulnerabilityCVE-2026-1587cvecve-2026-1587
Published: Thu Jan 29 2026 (01/29/2026, 12:32:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability has been found in Open5GS up to 2.7.6. The affected element is the function sgwc_s11_handle_modify_bearer_request of the file /sgwc/s11-handler.c of the component SGWC. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Applying a patch is the recommended action to fix this issue. The issue report is flagged as already-fixed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:35:39 UTC

Technical Analysis

Open5GS is an open-source implementation of the 5G core network, widely used for research, testing, and production in mobile network infrastructures. CVE-2026-1587 identifies a denial of service (DoS) vulnerability in the SGWC (Serving Gateway Control) component, specifically within the sgwc_s11_handle_modify_bearer_request function located in the /sgwc/s11-handler.c source file. This function handles Modify Bearer Request messages over the S11 interface, which is critical for bearer management in the 5G core network. The vulnerability arises from improper handling or validation of these requests, allowing a remote attacker to craft malicious packets that cause the SGWC process to crash or become unresponsive, leading to denial of service. The attack vector requires no authentication, user interaction, or privileges, and can be executed remotely over the network. The CVSS 4.0 base score is 6.9, reflecting a medium severity level due to the lack of confidentiality, integrity, or availability impact beyond service disruption. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. The issue has been publicly disclosed and fixed in subsequent releases, though no confirmed exploits have been detected in the wild. Given the critical role of SGWC in 5G core networks, this vulnerability could disrupt mobile network services if exploited.

Potential Impact

Exploitation of CVE-2026-1587 can cause denial of service in the SGWC component of Open5GS, leading to service outages or degraded performance in 5G core network operations. This disruption can affect bearer management, impacting user data sessions and potentially causing dropped connections or inability to establish new sessions. For mobile network operators and enterprises relying on Open5GS for 5G core functions, this could translate into network downtime, customer dissatisfaction, and potential financial losses. The lack of authentication or user interaction requirements increases the risk of automated or widespread attacks. While the vulnerability does not compromise data confidentiality or integrity, the availability impact on critical network infrastructure is significant. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the exploit code is publicly available. Organizations running vulnerable Open5GS versions should consider the potential for targeted attacks aiming to disrupt service availability.

Mitigation Recommendations

To mitigate CVE-2026-1587, organizations should promptly apply the official patches or upgrade Open5GS to versions later than 2.7.6 where the vulnerability is fixed. Network operators should implement strict filtering and validation of S11 interface traffic to block malformed or suspicious Modify Bearer Request messages. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect anomalous S11 traffic patterns can help identify exploitation attempts. Limiting network exposure of the S11 interface to trusted entities and enforcing network segmentation reduces the attack surface. Monitoring SGWC process health and implementing automated failover or restart mechanisms can minimize downtime if an attack occurs. Regularly auditing and updating Open5GS deployments, combined with comprehensive logging and alerting on control plane anomalies, will enhance early detection and response capabilities. Finally, organizations should stay informed about updates from Open5GS maintainers and security advisories related to 5G core components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-29T05:58:44.734Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697b7905ac06320222957a29

Added to database: 1/29/2026, 3:13:09 PM

Last enriched: 2/23/2026, 10:35:39 PM

Last updated: 3/24/2026, 10:43:28 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses