CVE-2026-2522: Memory Corruption in Open5GS
A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is an unknown function of the file /src/mme/esm-build.c of the component MME. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-2522 is a memory corruption vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure and private 5G deployments. The vulnerability resides in an unspecified function within the /src/mme/esm-build.c source file of the Mobility Management Entity (MME) component, which is responsible for managing signaling and session management in the 5G core network. The flaw allows remote attackers to manipulate input data to cause memory corruption, potentially leading to denial of service or arbitrary code execution. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and potential impact on availability and integrity, though confidentiality is not affected. The vulnerability was responsibly disclosed but remains unpatched as of the publication date, with no official response from the Open5GS project. No known exploits in the wild have been reported yet, but public proof-of-concept code exists, increasing the risk of exploitation. Given the critical role of the MME in 5G network operation, exploitation could disrupt mobile network services or allow attackers to execute arbitrary code within the network infrastructure. This poses a significant risk to telecom operators and enterprises relying on Open5GS for 5G core network functions.
Potential Impact
The vulnerability could have serious consequences for organizations operating 5G networks using Open5GS. Successful exploitation may lead to memory corruption resulting in denial of service, causing network outages or degraded service quality. In worst-case scenarios, attackers might achieve arbitrary code execution, compromising the integrity of the 5G core network and enabling further attacks such as interception or manipulation of mobile traffic. This could disrupt critical communications, affect subscriber services, and damage organizational reputation. Since the vulnerability requires no authentication and can be triggered remotely, attackers can exploit it from outside the network perimeter, increasing the attack surface. The lack of a patch and public exploit availability heightens the urgency for mitigation. Organizations deploying Open5GS in private or public 5G networks must consider the risk of service disruption and potential data integrity breaches. The impact extends to national infrastructure and industries relying on 5G connectivity, including manufacturing, healthcare, and transportation sectors.
Mitigation Recommendations
1. Immediately restrict network access to the MME component of Open5GS by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous traffic patterns related to the esm-build.c function or MME signaling messages. 3. Monitor logs and network traffic for unusual activity or repeated malformed packets that could indicate exploitation attempts. 4. Engage with the Open5GS community and maintain awareness of updates or patches addressing this vulnerability; apply patches promptly once available. 5. Consider deploying application-layer gateways or protocol-aware proxies that can validate and sanitize signaling messages before they reach the vulnerable component. 6. Conduct regular security assessments and penetration testing focused on the 5G core network components to identify and remediate weaknesses. 7. If feasible, implement redundancy and failover mechanisms for the MME to minimize service disruption in case of exploitation. 8. Educate network operations teams about this vulnerability and establish incident response plans specific to 5G core network threats.
Affected Countries
United States, South Korea, Germany, Japan, India, China, United Kingdom, France, Canada, Australia
CVE-2026-2522: Memory Corruption in Open5GS
Description
A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is an unknown function of the file /src/mme/esm-build.c of the component MME. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2522 is a memory corruption vulnerability identified in Open5GS, an open-source 5G core network implementation widely used for mobile network infrastructure and private 5G deployments. The vulnerability resides in an unspecified function within the /src/mme/esm-build.c source file of the Mobility Management Entity (MME) component, which is responsible for managing signaling and session management in the 5G core network. The flaw allows remote attackers to manipulate input data to cause memory corruption, potentially leading to denial of service or arbitrary code execution. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and potential impact on availability and integrity, though confidentiality is not affected. The vulnerability was responsibly disclosed but remains unpatched as of the publication date, with no official response from the Open5GS project. No known exploits in the wild have been reported yet, but public proof-of-concept code exists, increasing the risk of exploitation. Given the critical role of the MME in 5G network operation, exploitation could disrupt mobile network services or allow attackers to execute arbitrary code within the network infrastructure. This poses a significant risk to telecom operators and enterprises relying on Open5GS for 5G core network functions.
Potential Impact
The vulnerability could have serious consequences for organizations operating 5G networks using Open5GS. Successful exploitation may lead to memory corruption resulting in denial of service, causing network outages or degraded service quality. In worst-case scenarios, attackers might achieve arbitrary code execution, compromising the integrity of the 5G core network and enabling further attacks such as interception or manipulation of mobile traffic. This could disrupt critical communications, affect subscriber services, and damage organizational reputation. Since the vulnerability requires no authentication and can be triggered remotely, attackers can exploit it from outside the network perimeter, increasing the attack surface. The lack of a patch and public exploit availability heightens the urgency for mitigation. Organizations deploying Open5GS in private or public 5G networks must consider the risk of service disruption and potential data integrity breaches. The impact extends to national infrastructure and industries relying on 5G connectivity, including manufacturing, healthcare, and transportation sectors.
Mitigation Recommendations
1. Immediately restrict network access to the MME component of Open5GS by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous traffic patterns related to the esm-build.c function or MME signaling messages. 3. Monitor logs and network traffic for unusual activity or repeated malformed packets that could indicate exploitation attempts. 4. Engage with the Open5GS community and maintain awareness of updates or patches addressing this vulnerability; apply patches promptly once available. 5. Consider deploying application-layer gateways or protocol-aware proxies that can validate and sanitize signaling messages before they reach the vulnerable component. 6. Conduct regular security assessments and penetration testing focused on the 5G core network components to identify and remediate weaknesses. 7. If feasible, implement redundancy and failover mechanisms for the MME to minimize service disruption in case of exploitation. 8. Educate network operations teams about this vulnerability and establish incident response plans specific to 5G core network threats.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-15T08:38:26.971Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69925b77bda29fb02fd9898a
Added to database: 2/15/2026, 11:49:11 PM
Last enriched: 2/23/2026, 9:14:12 PM
Last updated: 4/5/2026, 4:46:55 AM
Views: 165
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.