Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2521: Memory Corruption in Open5GS

0
Medium
VulnerabilityCVE-2026-2521cvecve-2026-2521
Published: Sun Feb 15 2026 (02/15/2026, 23:02:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corruption. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:13:57 UTC

Technical Analysis

CVE-2026-2521 is a memory corruption vulnerability identified in Open5GS, an open-source 5G core network implementation widely used by telecom operators and researchers. The issue resides in the sgwc_s5c_handle_create_session_response function within the Serving Gateway Control Plane (SGW-C) component. This function handles session creation responses over the S5-C interface, which is critical for managing user session data between the Serving Gateway and the Packet Data Network Gateway. Improper handling or manipulation of input data in this function can lead to memory corruption, potentially causing crashes, denial of service, or arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of remote exploitation but limited impact scope due to the absence of privilege escalation or confidentiality/integrity violations beyond memory corruption. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. Although the Open5GS project was notified early, no official patch or response has been released at the time of publication. Public exploit code is available, which could facilitate attacks by malicious actors targeting telecom infrastructure using Open5GS. The lack of vendor response and patch availability increases the urgency for operators to implement interim mitigations and monitor for exploitation attempts.

Potential Impact

The vulnerability impacts the core network infrastructure of 5G deployments using Open5GS, specifically the Serving Gateway Control Plane responsible for session management. Exploitation can lead to memory corruption, which may cause service disruption through crashes or denial of service, impacting network availability. In worst cases, attackers might achieve arbitrary code execution, threatening the integrity and confidentiality of network functions and user data. Given that Open5GS is used globally in both production and research environments, the threat could affect telecom operators, private 5G networks, and enterprises deploying Open5GS-based solutions. Disruption of 5G core network components can degrade service quality, interrupt subscriber connectivity, and potentially expose sensitive subscriber information. The availability of public exploit code lowers the barrier for attackers, increasing the likelihood of targeted attacks. The absence of authentication and user interaction requirements further broadens the attack surface. Overall, this vulnerability poses a significant risk to the stability and security of 5G networks relying on Open5GS, with potential cascading effects on dependent services and applications.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level protections such as firewall rules and access control lists to restrict access to the SGW-C S5-C interface from untrusted networks, limiting exposure to potential attackers. 2. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous or malformed session creation response messages targeting the vulnerable function. 3. Monitor network logs and traffic for unusual patterns or crashes related to the SGW-C component to identify exploitation attempts early. 4. Engage with the Open5GS community and maintain awareness of updates or patches addressing this vulnerability; apply official patches promptly once released. 5. Consider deploying application-layer mitigations such as input validation or sandboxing around the affected function if feasible within the Open5GS codebase. 6. For operators running Open5GS in production, plan for rapid incident response and recovery procedures to minimize downtime in case of exploitation. 7. Evaluate alternative 5G core implementations or vendor-supported solutions with active security maintenance if patching is delayed. 8. Conduct regular security assessments and penetration testing focusing on 5G core network components to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T08:36:09.388Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699253b94b0e3abdf99ab24e

Added to database: 2/15/2026, 11:16:09 PM

Last enriched: 2/23/2026, 9:13:57 PM

Last updated: 4/4/2026, 4:52:54 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses