CVE-2026-1587

A vulnerability has been found in Open5GS up to 2.7.6. The affected element is the function sgwc_s11_handle_modify_bearer_request of the file /sgwc/s11-handler.c of the component SGWC. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Applying a patch is the recommended action to fix this issue. The issue report is flagged as already-fixed.
References
Link Resource
https://github.com/open5gs/open5gs/issues/4272 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4272#event-21968635948 Issue Tracking Exploit Vendor Advisory
https://github.com/open5gs/open5gs/issues/4272#issue-3795156752 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.343350 Permissions Required VDB Entry
https://vuldb.com/?id.343350 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738376 Third Party Advisory VDB Entry Exploit
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-29 13:15

Updated : 2026-02-02 18:40


NVD link : CVE-2026-1587

Mitre link : CVE-2026-1587

CVE.ORG link : CVE-2026-1587


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release