Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Open5GS up to 2.7.7. The affected element is the function ogs_nas_parse_qos_rules of the component SMF. Executing a manipulation can lead to denial of service. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | Open5GS SMF ogs_nas_parse_qos_rules denial of service | |
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| Weaknesses | CWE-404 | |
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Open5gs
Open5gs open5gs |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T12:47:22.687Z
Reserved: 2026-05-10T15:44:34.368Z
Link: CVE-2026-8270
Updated: 2026-05-11T12:47:17.791Z
Status : Analyzed
Published: 2026-05-11T05:16:15.937
Modified: 2026-05-12T17:19:37.500
Link: CVE-2026-8270
No data.
OpenCVE Enrichment
Updated: 2026-05-11T06:30:29Z