Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2517: Denial of Service in Open5GS

0
Medium
VulnerabilityCVE-2026-2517cvecve-2026-2517
Published: Sun Feb 15 2026 (02/15/2026, 12:32:08 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 06:41:09 UTC

Technical Analysis

CVE-2026-2517 is a denial of service vulnerability identified in Open5GS, an open-source 5G core network implementation, affecting versions 2.7.0 through 2.7.6. The vulnerability exists in the SMF (Session Management Function) component, specifically within the ogs_gtp2_parse_tft function located in the lib/gtp/v2/types.c source file. The root cause is improper validation or handling of the pf[0].content.length parameter, which can be manipulated by a remote attacker to trigger a denial of service condition. This manipulation likely leads to memory corruption, crashes, or infinite loops causing the SMF process to become unresponsive or terminate unexpectedly. The attack vector is network-based, requiring no authentication or user interaction, making it straightforward for remote exploitation. The SMF is a critical element in 5G core networks responsible for session management and policy enforcement, so disruption here can affect the overall network service availability. Although the Open5GS project was notified early, no patch or official response has been released at the time of this report. Public exploit code has been made available, increasing the urgency for mitigation. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and impact limited to availability without confidentiality or integrity compromise.

Potential Impact

The primary impact of CVE-2026-2517 is denial of service against the SMF component of Open5GS, which can lead to service outages or degradation in 5G core network operations. This can disrupt session management, affecting user connectivity, data sessions, and overall network reliability. For telecom operators and service providers relying on Open5GS, this could translate into customer service interruptions, loss of revenue, and reputational damage. In critical infrastructure contexts, such as emergency services or industrial IoT relying on 5G, the disruption could have broader societal impacts. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks at scale or as part of coordinated campaigns. The lack of an official patch increases exposure time, and the public availability of exploits raises the risk of opportunistic attacks. Organizations using Open5GS in production environments are particularly vulnerable, especially those with limited network segmentation or insufficient monitoring of control plane traffic.

Mitigation Recommendations

To mitigate CVE-2026-2517, organizations should first monitor Open5GS SMF logs and network traffic for anomalous or malformed GTPv2 packets targeting the ogs_gtp2_parse_tft function. Implement network-level filtering or rate limiting on GTPv2 control plane traffic to reduce exposure to malformed packets. Deploy intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect attempts exploiting this vulnerability. If possible, isolate the SMF component within a protected network segment to limit attack surface. Engage with the Open5GS community or maintainers to track patch releases and apply updates promptly once available. As a temporary workaround, consider disabling or restricting features that process TFT (Traffic Flow Template) parameters if feasible. Conduct regular backups and prepare incident response plans to quickly recover from potential DoS events. Finally, evaluate alternative 5G core solutions or vendor support if timely patches are not forthcoming.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-14T20:01:26.566Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6991c0114b0e3abdf95dbbfa

Added to database: 2/15/2026, 12:46:09 PM

Last enriched: 3/2/2026, 6:41:09 AM

Last updated: 3/30/2026, 4:49:37 PM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses