Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.5
Open5GS: Remote attackers may cause memory corruption
CVE-2026-2521
Summary
A security weakness in Open5GS, a software used by telecommunications companies, can be exploited by remote attackers to cause memory corruption. This can potentially lead to crashes or other security issues. Open5GS users should update to a fixed version to mitigate this risk.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| open5gs | open5gs | <= 2.7.6 | – |
Original title
A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory co...
Original description
A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corruption. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0
5.0
nvd CVSS3.1
9.8
nvd CVSS4.0
5.5
Vulnerability type
CWE-119
Buffer Overflow
- https://github.com/open5gs/open5gs/ Product
- https://github.com/open5gs/open5gs/issues/4282 Exploit Issue Tracking Vendor Advisory
- https://github.com/open5gs/open5gs/issues/4282#issue-3807902188 Exploit Issue Tracking Vendor Advisory
- https://vuldb.com/?ctiid.346109 Permissions Required VDB Entry
- https://vuldb.com/?id.346109 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.738334 Third Party Advisory VDB Entry
Published: 15 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026