Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2062: NULL Pointer Dereference in Open5GS

0
Medium
VulnerabilityCVE-2026-2062cvecve-2026-2062
Published: Fri Feb 06 2026 (02/06/2026, 18:32:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was identified in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_modify_bearer_response/sgwc_sxa_handle_session_modification_response of the component PGW S5U Address Handler. The manipulation leads to null pointer dereference. The attack can be initiated remotely. The exploit is publicly available and might be used. The identifier of the patch is f1bbd7b57f831e2a070780a7d8d5d4c73babdb59. Applying a patch is the recommended action to fix this issue.

AI-Powered Analysis

AILast updated: 02/06/2026, 19:14:44 UTC

Technical Analysis

CVE-2026-2062 is a vulnerability affecting Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure. The issue resides in the PGW S5U Address Handler component, specifically within the functions sgwc_s5c_handle_modify_bearer_response and sgwc_sxa_handle_session_modification_response. These functions handle session modification responses related to bearer management in the 5G packet gateway. Due to improper handling of input data, an attacker can trigger a NULL pointer dereference, causing the affected process to crash and resulting in a denial of service (DoS). The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on availability (VA:L) with no impact on confidentiality or integrity. Although no active exploitation in the wild has been reported, publicly available exploit code increases the likelihood of attacks. The vulnerability affects Open5GS versions 2.7.0 through 2.7.6. The issue was addressed in a patch identified by commit f1bbd7b57f831e2a070780a7d8d5d4c73babdb59, which should be applied promptly to mitigate the risk. This vulnerability primarily threatens the availability of 5G core network services, potentially disrupting mobile data sessions and impacting end-user connectivity.

Potential Impact

For European organizations, particularly telecom operators and mobile network providers deploying Open5GS in their 5G core infrastructure, this vulnerability poses a risk of service disruption through denial of service attacks. Such disruptions can degrade network reliability, affect customer experience, and lead to financial losses due to downtime and remediation costs. Critical services relying on mobile connectivity, including emergency services, IoT deployments, and enterprise communications, may be indirectly impacted. The vulnerability's remote exploitability without authentication increases the attack surface, making it attractive for threat actors aiming to disrupt network operations or cause reputational damage. Additionally, cascading failures in interconnected network components could amplify the impact. Given Europe's advanced 5G rollout and regulatory emphasis on network resilience, unpatched systems could face compliance and operational risks. The absence of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the importance of maintaining availability in critical telecom infrastructure.

Mitigation Recommendations

Organizations should immediately apply the official patch identified by commit f1bbd7b57f831e2a070780a7d8d5d4c73babdb59 to all affected Open5GS instances running versions 2.7.0 through 2.7.6. Network operators should conduct thorough inventory and version audits of their Open5GS deployments to identify vulnerable systems. Implement network segmentation and strict access controls to limit exposure of the PGW S5U Address Handler component to untrusted networks. Deploy monitoring and anomaly detection tools focused on detecting unusual session modification responses or process crashes indicative of exploitation attempts. Establish incident response procedures tailored to 5G core network components to rapidly address potential denial of service events. Consider redundancy and failover mechanisms within the 5G core to maintain service continuity during potential attacks. Engage with Open5GS community and vendors for timely updates and security advisories. Finally, conduct regular security assessments and penetration testing targeting 5G core network components to proactively identify and remediate vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T06:38:43.735Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69863a39f9fa50a62f278f67

Added to database: 2/6/2026, 7:00:09 PM

Last enriched: 2/6/2026, 7:14:44 PM

Last updated: 2/6/2026, 8:12:24 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats