CVE-2026-1738: Reachable Assertion in Open5GS
A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion. The attack can be executed remotely. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
AI Analysis
Technical Summary
CVE-2026-1738 identifies a vulnerability in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw resides in the SGWC (Serving Gateway Control Plane) component, specifically in the sgwc_tunnel_add function located in /src/sgwc/context.c. The vulnerability is triggered by manipulating the pdr (Packet Detection Rule) argument, which leads to a reachable assertion failure. This means that crafted input can cause the program to hit an assertion condition that was not expected to be reachable, potentially causing the process to terminate or behave unpredictably. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v4.0 base score is 6.9, reflecting a medium severity level due to the potential for denial of service or disruption of 5G core network functions. The flaw affects all Open5GS versions from 2.7.0 through 2.7.6, with a fix implemented in subsequent releases. Although no active exploitation has been reported, a proof-of-concept exploit is publicly available, which could facilitate attacks if not mitigated. The vulnerability impacts the integrity and availability of the 5G core network, critical for mobile communications and data services. Given Open5GS's role in managing user plane and control plane traffic, exploitation could disrupt mobile network operations, degrade service quality, or cause outages.
Potential Impact
For European organizations, especially telecom operators and mobile network providers deploying Open5GS, this vulnerability poses a risk to the stability and availability of 5G network services. Disruption of the SGWC component can lead to denial of service conditions, affecting end-user connectivity and potentially causing widespread service outages. This can impact critical communications infrastructure, emergency services, and business operations relying on 5G connectivity. Additionally, network instability may erode customer trust and lead to regulatory scrutiny under frameworks like the NIS2 Directive. The medium severity rating indicates a significant but not catastrophic risk; however, the ease of remote exploitation without authentication elevates the urgency for patching. European organizations involved in private 5G deployments, industrial IoT, or smart city initiatives using Open5GS are also at risk. The vulnerability could be leveraged in targeted attacks aiming to disrupt national or regional telecom infrastructure, especially in countries with advanced 5G rollouts and Open5GS adoption.
Mitigation Recommendations
1. Immediately upgrade Open5GS to the latest version beyond 2.7.6 where the vulnerability is fixed. 2. Implement network-level protections such as filtering and monitoring of traffic directed at the SGWC component to detect anomalous or malformed packets targeting the pdr argument. 3. Employ intrusion detection and prevention systems (IDS/IPS) tuned to recognize exploit attempts against Open5GS vulnerabilities. 4. Conduct regular security audits and code reviews of Open5GS deployments to identify and remediate potential weaknesses. 5. Isolate critical 5G core network components in segmented network zones with strict access controls to limit exposure. 6. Maintain up-to-date incident response plans specific to telecom infrastructure to quickly address any exploitation attempts. 7. Collaborate with Open5GS community and vendors for timely updates and security advisories. 8. Monitor public threat intelligence sources for emerging exploits or attack campaigns leveraging this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2026-1738: Reachable Assertion in Open5GS
Description
A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion. The attack can be executed remotely. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
AI-Powered Analysis
Technical Analysis
CVE-2026-1738 identifies a vulnerability in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The flaw resides in the SGWC (Serving Gateway Control Plane) component, specifically in the sgwc_tunnel_add function located in /src/sgwc/context.c. The vulnerability is triggered by manipulating the pdr (Packet Detection Rule) argument, which leads to a reachable assertion failure. This means that crafted input can cause the program to hit an assertion condition that was not expected to be reachable, potentially causing the process to terminate or behave unpredictably. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v4.0 base score is 6.9, reflecting a medium severity level due to the potential for denial of service or disruption of 5G core network functions. The flaw affects all Open5GS versions from 2.7.0 through 2.7.6, with a fix implemented in subsequent releases. Although no active exploitation has been reported, a proof-of-concept exploit is publicly available, which could facilitate attacks if not mitigated. The vulnerability impacts the integrity and availability of the 5G core network, critical for mobile communications and data services. Given Open5GS's role in managing user plane and control plane traffic, exploitation could disrupt mobile network operations, degrade service quality, or cause outages.
Potential Impact
For European organizations, especially telecom operators and mobile network providers deploying Open5GS, this vulnerability poses a risk to the stability and availability of 5G network services. Disruption of the SGWC component can lead to denial of service conditions, affecting end-user connectivity and potentially causing widespread service outages. This can impact critical communications infrastructure, emergency services, and business operations relying on 5G connectivity. Additionally, network instability may erode customer trust and lead to regulatory scrutiny under frameworks like the NIS2 Directive. The medium severity rating indicates a significant but not catastrophic risk; however, the ease of remote exploitation without authentication elevates the urgency for patching. European organizations involved in private 5G deployments, industrial IoT, or smart city initiatives using Open5GS are also at risk. The vulnerability could be leveraged in targeted attacks aiming to disrupt national or regional telecom infrastructure, especially in countries with advanced 5G rollouts and Open5GS adoption.
Mitigation Recommendations
1. Immediately upgrade Open5GS to the latest version beyond 2.7.6 where the vulnerability is fixed. 2. Implement network-level protections such as filtering and monitoring of traffic directed at the SGWC component to detect anomalous or malformed packets targeting the pdr argument. 3. Employ intrusion detection and prevention systems (IDS/IPS) tuned to recognize exploit attempts against Open5GS vulnerabilities. 4. Conduct regular security audits and code reviews of Open5GS deployments to identify and remediate potential weaknesses. 5. Isolate critical 5G core network components in segmented network zones with strict access controls to limit exposure. 6. Maintain up-to-date incident response plans specific to telecom infrastructure to quickly address any exploitation attempts. 7. Collaborate with Open5GS community and vendors for timely updates and security advisories. 8. Monitor public threat intelligence sources for emerging exploits or attack campaigns leveraging this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-01T07:44:44.291Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69800820ac063202227a8826
Added to database: 2/2/2026, 2:12:48 AM
Last enriched: 2/2/2026, 2:27:46 AM
Last updated: 2/7/2026, 4:12:16 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.