Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2523: Reachable Assertion in Open5GS

0
Medium
VulnerabilityCVE-2026-2523cvecve-2026-2523
Published: Mon Feb 16 2026 (02/16/2026, 00:02:07 UTC)
Source: CVE Database V5
Product: Open5GS

Description

A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 02/16/2026, 01:18:39 UTC

Technical Analysis

The vulnerability identified as CVE-2026-2523 affects Open5GS, an open-source 5G core network implementation widely used for research and production environments. Specifically, the issue resides in the SMF (Session Management Function) component within the function smf_gn_handle_create_pdp_context_request located in /src/smf/gn-handler.c. The flaw manifests as a reachable assertion triggered by crafted remote requests, which can cause the SMF process to terminate unexpectedly, resulting in denial of service conditions. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score of 6.9 (medium severity) reflects the ease of exploitation (network attack vector, low attack complexity) and the impact limited primarily to availability (denial of service). The vulnerability was responsibly disclosed early to the Open5GS project, but no patch or official response has been released as of the publication date. The availability of public exploit code increases the risk of exploitation by malicious actors targeting 5G core networks that rely on Open5GS. Given the critical role of the SMF in managing session contexts and user plane routing in 5G networks, disruption can lead to service outages affecting subscribers and network operations.

Potential Impact

For European organizations, particularly telecom operators and service providers deploying Open5GS in their 5G core networks, this vulnerability could lead to service disruptions through denial of service attacks against the SMF component. Such outages can degrade network reliability, impact subscriber connectivity, and potentially cause cascading failures in dependent network functions. The disruption of session management may also affect billing, lawful interception, and quality of service enforcement. Given the increasing reliance on 5G for critical infrastructure and enterprise services in Europe, exploitation could have broader economic and operational consequences. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks, increasing the urgency for mitigation. Organizations without timely patching or compensating controls may experience increased incident response costs and reputational damage.

Mitigation Recommendations

Since no official patch has been released, European organizations should implement immediate compensating controls. These include restricting network access to the SMF interface by enforcing strict firewall rules and network segmentation to limit exposure to untrusted networks. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify attempts to exploit this reachable assertion. Monitor SMF logs and system health metrics for signs of crashes or abnormal behavior. Engage with the Open5GS community and maintain vigilance for forthcoming patches or updates addressing this vulnerability. Consider deploying redundant SMF instances with failover capabilities to minimize service impact. Additionally, conduct regular security assessments and penetration tests focusing on 5G core components to identify and remediate similar weaknesses proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T08:39:59.010Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69926d0abda29fb02f03f16a

Added to database: 2/16/2026, 1:04:10 AM

Last enriched: 2/16/2026, 1:18:39 AM

Last updated: 2/21/2026, 12:16:55 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats