CVE-2026-2524
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely trigger a denial of service in Open5GS version 2.7.6, causing the system to become unresponsive. This vulnerability can be exploited without needing any special access or credentials.
Technical Description
A flaw has been found in Open5GS 2.7.6. The impacted element is the function mme_s11_handle_create_session_response of the component MME. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 16, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago
Vendor
open5gs
Product
open5gs
Related Vulnerabilities
An attacker can remotely exploit a vulnerability in Open5GS to trigger a failure in the system, potentially causing it to crash or behave unexpectedly. This issue affects versions up to 2.7.6, and while the developers were notified about the problem, they have not yet addressed it.
An attacker can remotely exploit a vulnerability in Open5GS to corrupt memory, potentially leading to unauthorized access or system crashes. This issue affects versions up to 2.7.6, and although it has been publicly disclosed, the vendor has not yet addressed it.
An attacker can remotely exploit a weakness in Open5GS to corrupt memory, potentially leading to crashes or unauthorized access to sensitive data. This vulnerability affects versions up to 2.7.6, and public exploit code is already available, making it easier for attackers to take advantage of the flaw.
An attacker can remotely cause a denial of service in Open5GS by manipulating specific data within the software, which can crash the system and make it unavailable. This vulnerability affects versions up to 2.7.6, and the exploit details are publicly available, meaning attackers could easily use it if they target systems running this version.