CVE-2026-2523: Reachable Assertion in Open5GS
A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-2523 affects Open5GS, an open-source 5G core network implementation widely used for research and production environments. Specifically, the issue resides in the SMF (Session Management Function) component within the function smf_gn_handle_create_pdp_context_request located in /src/smf/gn-handler.c. The flaw manifests as a reachable assertion triggered by crafted remote requests, which can cause the SMF process to terminate unexpectedly, resulting in denial of service conditions. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score of 6.9 (medium severity) reflects the ease of exploitation (network attack vector, low attack complexity) and the impact limited primarily to availability (denial of service). The vulnerability was responsibly disclosed early to the Open5GS project, but no patch or official response has been released as of the publication date. The availability of public exploit code increases the risk of exploitation by malicious actors targeting 5G core networks that rely on Open5GS. Given the critical role of the SMF in managing session contexts and user plane routing in 5G networks, disruption can lead to service outages affecting subscribers and network operations.
Potential Impact
For European organizations, particularly telecom operators and service providers deploying Open5GS in their 5G core networks, this vulnerability could lead to service disruptions through denial of service attacks against the SMF component. Such outages can degrade network reliability, impact subscriber connectivity, and potentially cause cascading failures in dependent network functions. The disruption of session management may also affect billing, lawful interception, and quality of service enforcement. Given the increasing reliance on 5G for critical infrastructure and enterprise services in Europe, exploitation could have broader economic and operational consequences. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks, increasing the urgency for mitigation. Organizations without timely patching or compensating controls may experience increased incident response costs and reputational damage.
Mitigation Recommendations
Since no official patch has been released, European organizations should implement immediate compensating controls. These include restricting network access to the SMF interface by enforcing strict firewall rules and network segmentation to limit exposure to untrusted networks. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify attempts to exploit this reachable assertion. Monitor SMF logs and system health metrics for signs of crashes or abnormal behavior. Engage with the Open5GS community and maintain vigilance for forthcoming patches or updates addressing this vulnerability. Consider deploying redundant SMF instances with failover capabilities to minimize service impact. Additionally, conduct regular security assessments and penetration tests focusing on 5G core components to identify and remediate similar weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2026-2523: Reachable Assertion in Open5GS
Description
A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-2523 affects Open5GS, an open-source 5G core network implementation widely used for research and production environments. Specifically, the issue resides in the SMF (Session Management Function) component within the function smf_gn_handle_create_pdp_context_request located in /src/smf/gn-handler.c. The flaw manifests as a reachable assertion triggered by crafted remote requests, which can cause the SMF process to terminate unexpectedly, resulting in denial of service conditions. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score of 6.9 (medium severity) reflects the ease of exploitation (network attack vector, low attack complexity) and the impact limited primarily to availability (denial of service). The vulnerability was responsibly disclosed early to the Open5GS project, but no patch or official response has been released as of the publication date. The availability of public exploit code increases the risk of exploitation by malicious actors targeting 5G core networks that rely on Open5GS. Given the critical role of the SMF in managing session contexts and user plane routing in 5G networks, disruption can lead to service outages affecting subscribers and network operations.
Potential Impact
For European organizations, particularly telecom operators and service providers deploying Open5GS in their 5G core networks, this vulnerability could lead to service disruptions through denial of service attacks against the SMF component. Such outages can degrade network reliability, impact subscriber connectivity, and potentially cause cascading failures in dependent network functions. The disruption of session management may also affect billing, lawful interception, and quality of service enforcement. Given the increasing reliance on 5G for critical infrastructure and enterprise services in Europe, exploitation could have broader economic and operational consequences. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks, increasing the urgency for mitigation. Organizations without timely patching or compensating controls may experience increased incident response costs and reputational damage.
Mitigation Recommendations
Since no official patch has been released, European organizations should implement immediate compensating controls. These include restricting network access to the SMF interface by enforcing strict firewall rules and network segmentation to limit exposure to untrusted networks. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify attempts to exploit this reachable assertion. Monitor SMF logs and system health metrics for signs of crashes or abnormal behavior. Engage with the Open5GS community and maintain vigilance for forthcoming patches or updates addressing this vulnerability. Consider deploying redundant SMF instances with failover capabilities to minimize service impact. Additionally, conduct regular security assessments and penetration tests focusing on 5G core components to identify and remediate similar weaknesses proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-15T08:39:59.010Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69926d0abda29fb02f03f16a
Added to database: 2/16/2026, 1:04:10 AM
Last enriched: 2/16/2026, 1:18:39 AM
Last updated: 2/21/2026, 12:16:55 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.