No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Open5GS up to 2.7.7. The impacted element is the function ogs_sbi_parse_plmn_list in the library /lib/sbi/conv.c of the component NSSF. The manipulation leads to denial of service. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | Open5GS NSSF conv.c ogs_sbi_parse_plmn_list denial of service | |
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| Weaknesses | CWE-404 | |
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Open5gs
Open5gs open5gs |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-08T14:12:22.531Z
Reserved: 2026-05-07T16:56:47.235Z
Link: CVE-2026-8121
Updated: 2026-05-08T14:12:19.362Z
Status : Undergoing Analysis
Published: 2026-05-08T01:16:09.860
Modified: 2026-05-08T15:40:37.110
Link: CVE-2026-8121
No data.
OpenCVE Enrichment
Updated: 2026-05-08T02:30:43Z