CVE-2026-2523

A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function smf_gn_handle_create_pdp_context_request of the file /src/smf/gn-handler.c of the component SMF. The manipulation results in reachable assertion. It is possible to launch the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/open5gs/open5gs/ Product
https://github.com/open5gs/open5gs/issues/4285 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4285#issue-3809055236 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.346111 Permissions Required VDB Entry
https://vuldb.com/?id.346111 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738342 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

18 Feb 2026, 19:07

Type Values Removed Values Added
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
First Time Open5gs open5gs
Open5gs
References () https://github.com/open5gs/open5gs/ - () https://github.com/open5gs/open5gs/ - Product
References () https://github.com/open5gs/open5gs/issues/4285 - () https://github.com/open5gs/open5gs/issues/4285 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4285#issue-3809055236 - () https://github.com/open5gs/open5gs/issues/4285#issue-3809055236 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.346111 - () https://vuldb.com/?ctiid.346111 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.346111 - () https://vuldb.com/?id.346111 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.738342 - () https://vuldb.com/?submit.738342 - Third Party Advisory, VDB Entry

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Se detectó una vulnerabilidad en Open5GS hasta la versión 2.7.6. El elemento afectado es la función smf_gn_handle_create_pdp_context_request del archivo /src/smf/gn-handler.c del componente SMF. La manipulación resulta en una aserción alcanzable. Es posible lanzar el ataque de forma remota. El exploit ahora es público y puede ser utilizado. Se informó al proyecto del problema con antelación a través de un informe de incidencias, pero aún no ha respondido.

16 Feb 2026, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-16 01:15

Updated : 2026-02-18 19:07


NVD link : CVE-2026-2523

Mitre link : CVE-2026-2523

CVE.ORG link : CVE-2026-2523


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-617

Reachable Assertion