๐Ÿ” CVE Alert

CVE-2026-8224

MEDIUM 5.3

Open5GS PCF context.c pcf_sess_set_ipv6prefix denial of service

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
13th

A vulnerability was determined in Open5GS up to 2.7.7. Affected by this issue is the function pcf_sess_set_ipv6prefix of the file /src/pcf/context.c of the component PCF. Executing a manipulation of the argument SmPolicyContextData.ipv6AddressPrefix can lead to denial of service. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-404
Vendor n/a
Product open5gs
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for n/a open5gs

Be the first to know when new medium vulnerabilities affecting n/a open5gs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / Open5GS
2.7.0 2.7.1 2.7.2 2.7.3 2.7.4 2.7.5 2.7.6 2.7.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/362441 vuldb.com: https://vuldb.com/vuln/362441/cti vuldb.com: https://vuldb.com/submit/808443 github.com: https://github.com/open5gs/open5gs/issues/4439 github.com: https://github.com/open5gs/open5gs/

Credits

๐Ÿ” LinZiyu (VulDB User) VulDB CNA Team