CVE-2026-2521: Memory Corruption in Open5GS
A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corruption. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-2521 is a memory corruption vulnerability identified in Open5GS, an open-source 5G core network implementation widely used by telecom operators and researchers. The issue resides in the sgwc_s5c_handle_create_session_response function within the Serving Gateway Control Plane (SGW-C) component. This function handles session creation responses over the S5-C interface, which is critical for managing user session data between the Serving Gateway and the Packet Data Network Gateway. Improper handling or manipulation of input data in this function can lead to memory corruption, potentially causing crashes, denial of service, or arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of remote exploitation but limited impact scope due to the absence of privilege escalation or confidentiality/integrity violations beyond memory corruption. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. Although the Open5GS project was notified early, no official patch or response has been released at the time of publication. Public exploit code is available, which could facilitate attacks by malicious actors targeting telecom infrastructure using Open5GS. The lack of vendor response and patch availability increases the urgency for operators to implement interim mitigations and monitor for exploitation attempts.
Potential Impact
The vulnerability impacts the core network infrastructure of 5G deployments using Open5GS, specifically the Serving Gateway Control Plane responsible for session management. Exploitation can lead to memory corruption, which may cause service disruption through crashes or denial of service, impacting network availability. In worst cases, attackers might achieve arbitrary code execution, threatening the integrity and confidentiality of network functions and user data. Given that Open5GS is used globally in both production and research environments, the threat could affect telecom operators, private 5G networks, and enterprises deploying Open5GS-based solutions. Disruption of 5G core network components can degrade service quality, interrupt subscriber connectivity, and potentially expose sensitive subscriber information. The availability of public exploit code lowers the barrier for attackers, increasing the likelihood of targeted attacks. The absence of authentication and user interaction requirements further broadens the attack surface. Overall, this vulnerability poses a significant risk to the stability and security of 5G networks relying on Open5GS, with potential cascading effects on dependent services and applications.
Mitigation Recommendations
1. Immediate mitigation should focus on network-level protections such as firewall rules and access control lists to restrict access to the SGW-C S5-C interface from untrusted networks, limiting exposure to potential attackers. 2. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous or malformed session creation response messages targeting the vulnerable function. 3. Monitor network logs and traffic for unusual patterns or crashes related to the SGW-C component to identify exploitation attempts early. 4. Engage with the Open5GS community and maintain awareness of updates or patches addressing this vulnerability; apply official patches promptly once released. 5. Consider deploying application-layer mitigations such as input validation or sandboxing around the affected function if feasible within the Open5GS codebase. 6. For operators running Open5GS in production, plan for rapid incident response and recovery procedures to minimize downtime in case of exploitation. 7. Evaluate alternative 5G core implementations or vendor-supported solutions with active security maintenance if patching is delayed. 8. Conduct regular security assessments and penetration testing focusing on 5G core network components to identify and remediate similar vulnerabilities proactively.
Affected Countries
United States, China, India, Germany, South Korea, Japan, France, United Kingdom, Brazil, Australia, Canada, Italy, Spain, Netherlands
CVE-2026-2521: Memory Corruption in Open5GS
Description
A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corruption. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2521 is a memory corruption vulnerability identified in Open5GS, an open-source 5G core network implementation widely used by telecom operators and researchers. The issue resides in the sgwc_s5c_handle_create_session_response function within the Serving Gateway Control Plane (SGW-C) component. This function handles session creation responses over the S5-C interface, which is critical for managing user session data between the Serving Gateway and the Packet Data Network Gateway. Improper handling or manipulation of input data in this function can lead to memory corruption, potentially causing crashes, denial of service, or arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of remote exploitation but limited impact scope due to the absence of privilege escalation or confidentiality/integrity violations beyond memory corruption. The vulnerability affects all Open5GS versions from 2.7.0 through 2.7.6. Although the Open5GS project was notified early, no official patch or response has been released at the time of publication. Public exploit code is available, which could facilitate attacks by malicious actors targeting telecom infrastructure using Open5GS. The lack of vendor response and patch availability increases the urgency for operators to implement interim mitigations and monitor for exploitation attempts.
Potential Impact
The vulnerability impacts the core network infrastructure of 5G deployments using Open5GS, specifically the Serving Gateway Control Plane responsible for session management. Exploitation can lead to memory corruption, which may cause service disruption through crashes or denial of service, impacting network availability. In worst cases, attackers might achieve arbitrary code execution, threatening the integrity and confidentiality of network functions and user data. Given that Open5GS is used globally in both production and research environments, the threat could affect telecom operators, private 5G networks, and enterprises deploying Open5GS-based solutions. Disruption of 5G core network components can degrade service quality, interrupt subscriber connectivity, and potentially expose sensitive subscriber information. The availability of public exploit code lowers the barrier for attackers, increasing the likelihood of targeted attacks. The absence of authentication and user interaction requirements further broadens the attack surface. Overall, this vulnerability poses a significant risk to the stability and security of 5G networks relying on Open5GS, with potential cascading effects on dependent services and applications.
Mitigation Recommendations
1. Immediate mitigation should focus on network-level protections such as firewall rules and access control lists to restrict access to the SGW-C S5-C interface from untrusted networks, limiting exposure to potential attackers. 2. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous or malformed session creation response messages targeting the vulnerable function. 3. Monitor network logs and traffic for unusual patterns or crashes related to the SGW-C component to identify exploitation attempts early. 4. Engage with the Open5GS community and maintain awareness of updates or patches addressing this vulnerability; apply official patches promptly once released. 5. Consider deploying application-layer mitigations such as input validation or sandboxing around the affected function if feasible within the Open5GS codebase. 6. For operators running Open5GS in production, plan for rapid incident response and recovery procedures to minimize downtime in case of exploitation. 7. Evaluate alternative 5G core implementations or vendor-supported solutions with active security maintenance if patching is delayed. 8. Conduct regular security assessments and penetration testing focusing on 5G core network components to identify and remediate similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-15T08:36:09.388Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699253b94b0e3abdf99ab24e
Added to database: 2/15/2026, 11:16:09 PM
Last enriched: 2/23/2026, 9:13:57 PM
Last updated: 4/4/2026, 4:52:54 PM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.