Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1736: Reachable Assertion in Open5GS

0
Medium
VulnerabilityCVE-2026-1736cvecve-2026-1736
Published: Mon Feb 02 2026 (02/02/2026, 00:32:06 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c of the component SGWC. Such manipulation leads to reachable assertion. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. A patch should be applied to remediate this issue. The issue report is flagged as already-fixed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:54:39 UTC

Technical Analysis

CVE-2026-1736 identifies a reachable assertion vulnerability in Open5GS, an open-source 5G core network implementation widely used by telecom operators and research institutions. The flaw resides in the SGWC (Serving Gateway Control) component, specifically within the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request located in /src/sgwc/s11-handler.c. This function handles requests related to indirect data forwarding tunnels over the S11 interface, which is critical for user plane data forwarding in 5G networks. An attacker can remotely send crafted messages to this function, triggering an assertion failure that causes the process to terminate unexpectedly. This results in a denial of service condition, disrupting the availability of the affected network function. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. The issue affects Open5GS versions 2.7.0 through 2.7.6, and a fix has been released in subsequent versions. While no active exploitation has been observed, the public disclosure of the exploit code increases the risk of opportunistic attacks. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required, and limited impact on availability (VA:L), resulting in a medium severity rating with a score of 6.9.

Potential Impact

The primary impact of CVE-2026-1736 is the potential for denial of service against Open5GS SGWC components, which are integral to 5G core network operations. Disruption of the SGWC can interrupt user plane data forwarding, leading to degraded or lost connectivity for mobile subscribers. This can affect telecom operators' ability to maintain continuous service, impacting customer experience and potentially causing financial losses. Additionally, denial of service in core network functions can have cascading effects on dependent services and applications. Since the vulnerability can be exploited remotely without authentication, attackers can launch attacks from anywhere on the internet, increasing the threat surface. Organizations relying on Open5GS for 5G network infrastructure, including research labs, private networks, and smaller operators, are at risk. Although the vulnerability does not directly lead to data confidentiality or integrity breaches, the availability impact on critical telecom infrastructure is significant. The medium severity rating reflects these factors, emphasizing the need for timely patching to maintain network reliability.

Mitigation Recommendations

Organizations should immediately upgrade Open5GS deployments to versions later than 2.7.6 where the vulnerability is patched. If upgrading is not immediately feasible, network administrators should implement strict filtering and validation of S11 interface traffic to block malformed or suspicious packets that could trigger the assertion. Deploying intrusion detection or prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts against this vulnerability can provide additional protection. Network segmentation should be enforced to isolate core network functions from untrusted networks, reducing exposure. Regular monitoring of SGWC logs and system health can help detect early signs of exploitation or instability. Operators should also review and harden their overall 5G core network security posture, including applying the latest security patches for all components. Coordination with Open5GS community and vendors for timely updates and advisories is recommended. Finally, conducting penetration testing and vulnerability assessments focused on 5G core components can help identify residual risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-01T07:44:34.393Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697ff68cac06320222673ab0

Added to database: 2/2/2026, 12:57:48 AM

Last enriched: 2/23/2026, 9:54:39 PM

Last updated: 3/25/2026, 1:23:14 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses