VYPR
Medium severity4.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8729

CVE-2026-8729

Description

A vulnerability was detected in Open5GS up to 2.7.7. This affects an unknown function in the library /lib/sbi/message.c of the component NRF. Performing a manipulation of the argument service-names/snssais results in denial of service. The attack is possible to be carried out remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A denial-of-service vulnerability in Open5GS NRF allows remote attackers to crash the process via an oversized service-names query parameter.

Vulnerability

The vulnerability exists in Open5GS up to version 2.7.7, specifically in the NRF component's SBI message handling in /lib/sbi/message.c. When parsing a discovery query, the function ogs_sbi_discovery_option_add_service_names asserts that the number of service names is less than OGS_SBI_MAX_NUM_OF_SERVICE_TYPE. An attacker can send a GET request to /nnrf-disc/v1/nf-instances with a service-names parameter containing more than the allowed number of service types, causing the assertion to fail and the NRF process to abort. [1]

Exploitation

The attacker needs network access to the NRF endpoint; no authentication is required. The attack is performed by sending a crafted HTTP/2 GET request with an oversized service-names query parameter. For example, including 81 comma-separated service names triggers the assertion. The connection is reset and the NRF process exits with code 139. [1]

Impact

Successful exploitation results in a denial of service (DoS) of the NRF component, which is a critical part of the 5G core network. The NRF process crashes, disrupting network function discovery and registration services. The impact is limited to availability; no data confidentiality or integrity is compromised. [1]

Mitigation

As of the publication date, no official fix has been released. The project was informed via an issue report but has not responded. Users should monitor the Open5GS repository for a patch. A potential workaround is to implement a reverse proxy or API gateway that validates the service-names parameter length before forwarding requests to the NRF. [1][2]

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Open5gs/Open5gsreferences2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)range: <=2.7.7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.