VYPR
Medium severity4.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8728

CVE-2026-8728

Description

A security vulnerability has been detected in Open5GS up to 2.7.7. The impacted element is the function ogs_sbi_discovery_option_parse_plmn_list in the library /lib/sbi/conv.c of the component NRF. Such manipulation of the argument target-plmn-list leads to denial of service. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open5GS NRF crashes due to NULL pointer dereference in the function `ogs_sbi_discovery_option_parse_plmn_list` when a malformed `target-plmn-list` is sent, leading to denial of service.

Vulnerability

A denial of service vulnerability exists in Open5GS up to version 2.7.7. The flaw is located in the function ogs_sbi_discovery_option_parse_plmn_list within /lib/sbi/conv.c of the NRF component. When the target-plmn-list (or requester-plmn-list) query parameter contains invalid JSON, ogs_sbi_parse_plmn_list is called with a NULL PlmnList, triggering an assertion failure (ogs_sbi_parse_plmn_list: Assertion 'PlmnList' failed.). This causes the NRF process to crash and exit with code 139 [1]. The vulnerable parser path is reused for both parameters, making the attack possible via either one [1].

Exploitation

An unauthenticated attacker can remotely exploit this vulnerability with no prior access or authentication [1]. The attacker sends an HTTP GET request to the NRF's discovery endpoint (/nnrf-disc/v1/nf-instances) with a malformed target-plmn-list parameter (e.g., target-plmn-list=not-json) [1]. The request does not require any user interaction or special network position beyond reachability to the NRF service. The NRF crashes immediately upon processing the malformed input, as demonstrated in the published exploit steps [1].

Impact

Successful exploitation results in a denial of service condition. The NRF process exits, terminating its service and causing disruption to 5G core network discovery functions that rely on NRF [1]. This can impact network operation until the NRF is restarted. The vulnerability has a CVSS v3 score of 4.3 (Medium) and is publicly disclosed with a proof-of-concept [1].

Mitigation

As of the publication date, no patch is available. The project was notified via an issue report but has not responded [1]. Fixed version not yet released; version 2.7.7 is the last affected version [1]. There is no known workaround provided in the references. Users should monitor the Open5GS repository for updates [2] and consider isolating the NRF service from untrusted networks as a temporary measure.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.