CVE-2026-2517: Denial of Service in Open5GS
CVE-2026-2517 is a medium severity denial of service vulnerability in Open5GS versions up to 2. 7. 6, specifically in the SMF component's ogs_gtp2_parse_tft function. The flaw arises from improper handling of the pf[0]. content. length argument, allowing remote attackers to cause a crash or service disruption without authentication or user interaction. Although an exploit has been publicly released, no confirmed active exploitation in the wild has been reported. This vulnerability affects the availability of Open5GS deployments, which are critical in 5G core network infrastructures. European telecom operators using Open5GS could face service outages or degraded network performance if targeted. Mitigation requires careful input validation and patching once updates become available, alongside network-level protections to detect and block malformed GTPv2 traffic.
AI Analysis
Technical Summary
CVE-2026-2517 is a denial of service (DoS) vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network functions. The vulnerability exists in the SMF (Session Management Function) component, specifically within the ogs_gtp2_parse_tft function located in the lib/gtp/v2/types.c source file. The flaw is triggered by manipulating the pf[0].content.length argument, which is part of the Traffic Flow Template (TFT) parsing logic in the GTPv2 protocol handling. Improper validation or bounds checking of this length parameter can cause the function to behave unexpectedly, leading to a crash or denial of service condition. The attack vector is remote and does not require any authentication or user interaction, making it relatively easy to exploit by sending crafted GTPv2 messages to the vulnerable SMF instance. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. Although the project was notified early, no patch or official response has been released at the time of publication. The exploit code has been made publicly available, increasing the risk of opportunistic attacks. Given Open5GS’s role in managing 5G session control and mobility, a successful DoS attack could disrupt mobile network services, impacting user connectivity and operator infrastructure stability.
Potential Impact
For European organizations, especially telecom operators and mobile network providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a significant risk to network availability. A successful DoS attack could lead to service outages, degraded network performance, and potential loss of customer trust. Disruptions in 5G core functions such as session management could affect a wide range of services relying on mobile connectivity, including IoT applications, critical communications, and enterprise services. The impact extends beyond direct service interruptions to potential regulatory and reputational consequences under European data protection and telecom regulations. Since the exploit requires no authentication and can be launched remotely, attackers could target networks from outside the operator’s perimeter, complicating defense efforts. The lack of an official patch increases exposure time, necessitating immediate mitigation measures to protect critical infrastructure.
Mitigation Recommendations
1. Monitor network traffic for anomalous or malformed GTPv2 messages targeting the SMF component, using deep packet inspection and behavior-based anomaly detection tools. 2. Implement strict input validation and filtering at the network edge or within the 5G core to block suspicious packets with abnormal pf[0].content.length values. 3. Deploy network segmentation and isolation to limit exposure of the SMF to untrusted networks and reduce attack surface. 4. Engage with the Open5GS community and maintain awareness for forthcoming patches or updates addressing this vulnerability; apply patches promptly once available. 5. Consider temporary workarounds such as disabling or restricting access to vulnerable SMF interfaces if feasible without disrupting essential services. 6. Conduct regular security assessments and penetration testing focused on GTP protocol handling to identify similar weaknesses. 7. Collaborate with upstream vendors and telecom partners to share threat intelligence and coordinate defensive measures. 8. Prepare incident response plans specifically for 5G core network DoS scenarios to minimize downtime and recovery time.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2026-2517: Denial of Service in Open5GS
Description
CVE-2026-2517 is a medium severity denial of service vulnerability in Open5GS versions up to 2. 7. 6, specifically in the SMF component's ogs_gtp2_parse_tft function. The flaw arises from improper handling of the pf[0]. content. length argument, allowing remote attackers to cause a crash or service disruption without authentication or user interaction. Although an exploit has been publicly released, no confirmed active exploitation in the wild has been reported. This vulnerability affects the availability of Open5GS deployments, which are critical in 5G core network infrastructures. European telecom operators using Open5GS could face service outages or degraded network performance if targeted. Mitigation requires careful input validation and patching once updates become available, alongside network-level protections to detect and block malformed GTPv2 traffic.
AI-Powered Analysis
Technical Analysis
CVE-2026-2517 is a denial of service (DoS) vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network functions. The vulnerability exists in the SMF (Session Management Function) component, specifically within the ogs_gtp2_parse_tft function located in the lib/gtp/v2/types.c source file. The flaw is triggered by manipulating the pf[0].content.length argument, which is part of the Traffic Flow Template (TFT) parsing logic in the GTPv2 protocol handling. Improper validation or bounds checking of this length parameter can cause the function to behave unexpectedly, leading to a crash or denial of service condition. The attack vector is remote and does not require any authentication or user interaction, making it relatively easy to exploit by sending crafted GTPv2 messages to the vulnerable SMF instance. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. Although the project was notified early, no patch or official response has been released at the time of publication. The exploit code has been made publicly available, increasing the risk of opportunistic attacks. Given Open5GS’s role in managing 5G session control and mobility, a successful DoS attack could disrupt mobile network services, impacting user connectivity and operator infrastructure stability.
Potential Impact
For European organizations, especially telecom operators and mobile network providers deploying Open5GS as part of their 5G core infrastructure, this vulnerability poses a significant risk to network availability. A successful DoS attack could lead to service outages, degraded network performance, and potential loss of customer trust. Disruptions in 5G core functions such as session management could affect a wide range of services relying on mobile connectivity, including IoT applications, critical communications, and enterprise services. The impact extends beyond direct service interruptions to potential regulatory and reputational consequences under European data protection and telecom regulations. Since the exploit requires no authentication and can be launched remotely, attackers could target networks from outside the operator’s perimeter, complicating defense efforts. The lack of an official patch increases exposure time, necessitating immediate mitigation measures to protect critical infrastructure.
Mitigation Recommendations
1. Monitor network traffic for anomalous or malformed GTPv2 messages targeting the SMF component, using deep packet inspection and behavior-based anomaly detection tools. 2. Implement strict input validation and filtering at the network edge or within the 5G core to block suspicious packets with abnormal pf[0].content.length values. 3. Deploy network segmentation and isolation to limit exposure of the SMF to untrusted networks and reduce attack surface. 4. Engage with the Open5GS community and maintain awareness for forthcoming patches or updates addressing this vulnerability; apply patches promptly once available. 5. Consider temporary workarounds such as disabling or restricting access to vulnerable SMF interfaces if feasible without disrupting essential services. 6. Conduct regular security assessments and penetration testing focused on GTP protocol handling to identify similar weaknesses. 7. Collaborate with upstream vendors and telecom partners to share threat intelligence and coordinate defensive measures. 8. Prepare incident response plans specifically for 5G core network DoS scenarios to minimize downtime and recovery time.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-14T20:01:26.566Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6991c0114b0e3abdf95dbbfa
Added to database: 2/15/2026, 12:46:09 PM
Last enriched: 2/15/2026, 1:00:28 PM
Last updated: 2/15/2026, 2:30:15 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2516: Uncontrolled Search Path in Unidocs ezPDF DRM Reader
HighCVE-2026-2541: CWE-331: Insufficient Entropy in Micca Auto Electronics Co., Ltd. Car Alarm System KE700
MediumCVE-2026-2540: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Micca Auto Electronics Co., Ltd. Car Alarm System KE700
HighCVE-2025-32063: CWE-306 Missing Authentication for Critical Function in Bosch Infotainment system ECU
MediumCVE-2025-32062: CWE-121: Stack-based Buffer Overflow in Bosch Infotainment system ECU
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.