Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2062: NULL Pointer Dereference in Open5GS

0
Medium
VulnerabilityCVE-2026-2062cvecve-2026-2062
Published: Fri Feb 06 2026 (02/06/2026, 18:32:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was identified in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_modify_bearer_response/sgwc_sxa_handle_session_modification_response of the component PGW S5U Address Handler. The manipulation leads to null pointer dereference. The attack can be initiated remotely. The exploit is publicly available and might be used. The identifier of the patch is f1bbd7b57f831e2a070780a7d8d5d4c73babdb59. Applying a patch is the recommended action to fix this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:09:10 UTC

Technical Analysis

CVE-2026-2062 is a vulnerability in Open5GS, an open-source 5G core network implementation, specifically affecting versions 2.7.0 through 2.7.6. The issue arises from a null pointer dereference in the PGW (Packet Gateway) S5U Address Handler component, within the functions sgwc_s5c_handle_modify_bearer_response and sgwc_sxa_handle_session_modification_response. These functions handle session modification responses related to bearer management in the 5G core network. The null pointer dereference occurs due to improper handling of certain input data, which can be manipulated remotely by an attacker without requiring authentication or user interaction. Exploiting this vulnerability can cause the affected process to crash, leading to a denial of service (DoS) condition in the 5G core network infrastructure. This can disrupt mobile network services reliant on Open5GS. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting its medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability beyond causing service disruption. A public exploit exists, increasing the likelihood of exploitation in the wild. The Open5GS project has released a patch identified by commit f1bbd7b57f831e2a070780a7d8d5d4c73babdb59 to address this issue. Organizations using affected versions should apply this patch promptly to prevent potential service outages.

Potential Impact

The primary impact of CVE-2026-2062 is a denial of service condition caused by a null pointer dereference crash in the Open5GS PGW component. This can disrupt 5G core network operations, affecting mobile data connectivity and session management for subscribers. For telecommunications providers and enterprises relying on Open5GS for 5G core network functions, this could lead to service outages, degraded network performance, and customer dissatisfaction. The vulnerability's remote exploitability without authentication increases the risk of targeted attacks or opportunistic exploitation by threat actors. While it does not directly compromise data confidentiality or integrity, the availability impact on critical network infrastructure can have cascading effects on dependent services and emergency communications. The existence of a public exploit further elevates the threat level, potentially enabling attackers to cause widespread disruption if patches are not applied. Organizations operating Open5GS in production environments must consider the operational risks and potential regulatory implications of service interruptions.

Mitigation Recommendations

To mitigate CVE-2026-2062, organizations should immediately apply the official patch released by the Open5GS project, identified by commit f1bbd7b57f831e2a070780a7d8d5d4c73babdb59. Beyond patching, network operators should implement robust monitoring of Open5GS components to detect abnormal crashes or service disruptions indicative of exploitation attempts. Deploying network-level protections such as firewalls and intrusion detection/prevention systems (IDS/IPS) can help filter and alert on suspicious traffic targeting the PGW interfaces. Conduct thorough testing of patched versions in staging environments before production deployment to ensure stability. Maintain strict access controls and network segmentation to limit exposure of the 5G core network to untrusted sources. Regularly update and audit Open5GS deployments and dependencies to minimize exposure to known vulnerabilities. Additionally, consider implementing redundancy and failover mechanisms within the 5G core network to reduce the impact of potential service disruptions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T06:38:43.735Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69863a39f9fa50a62f278f67

Added to database: 2/6/2026, 7:00:09 PM

Last enriched: 2/23/2026, 10:09:10 PM

Last updated: 3/22/2026, 9:41:27 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses