No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Open5GS up to 2.7.7. This affects the function gsm_handle_pdu_session_modification_qos_flow_descriptions of the file src/smf/gsm-handler.c of the component SMF. Executing a manipulation of the argument n1SmMsg can lead to denial of service. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The pull request to fix this issue awaits acceptance. | |
| Title | Open5GS SMF gsm-handler.c denial of service | |
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| Weaknesses | CWE-404 | |
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Open5gs
Open5gs open5gs |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T13:40:14.067Z
Reserved: 2026-05-11T08:02:04.227Z
Link: CVE-2026-8288
Updated: 2026-05-11T13:40:10.225Z
Status : Undergoing Analysis
Published: 2026-05-11T13:16:12.073
Modified: 2026-05-11T15:10:16.663
Link: CVE-2026-8288
No data.
OpenCVE Enrichment
Updated: 2026-05-11T17:15:40Z