CVE-2026-8729
Description
A vulnerability was detected in Open5GS up to 2.7.7. This affects an unknown function in the library /lib/sbi/message.c of the component NRF. Performing a manipulation of the argument service-names/snssais results in denial of service. The attack is possible to be carried out remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A denial-of-service vulnerability in Open5GS NRF allows remote attackers to crash the process via an oversized service-names query parameter.
Vulnerability
The vulnerability exists in Open5GS up to version 2.7.7, specifically in the NRF component's SBI message handling in /lib/sbi/message.c. When parsing a discovery query, the function ogs_sbi_discovery_option_add_service_names asserts that the number of service names is less than OGS_SBI_MAX_NUM_OF_SERVICE_TYPE. An attacker can send a GET request to /nnrf-disc/v1/nf-instances with a service-names parameter containing more than the allowed number of service types, causing the assertion to fail and the NRF process to abort. [1]
Exploitation
The attacker needs network access to the NRF endpoint; no authentication is required. The attack is performed by sending a crafted HTTP/2 GET request with an oversized service-names query parameter. For example, including 81 comma-separated service names triggers the assertion. The connection is reset and the NRF process exits with code 139. [1]
Impact
Successful exploitation results in a denial of service (DoS) of the NRF component, which is a critical part of the 5G core network. The NRF process crashes, disrupting network function discovery and registration services. The impact is limited to availability; no data confidentiality or integrity is compromised. [1]
Mitigation
As of the publication date, no official fix has been released. The project was informed via an issue report but has not responded. Users should monitor the Open5GS repository for a patch. A potential workaround is to implement a reverse proxy or API gateway that validates the service-names parameter length before forwarding requests to the NRF. [1][2]
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/open5gs/open5gs/issues/4460nvdExploitIssue Tracking
- vuldb.com/submit/808512nvdThird Party AdvisoryVDB Entry
- vuldb.com/submit/808513nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/364318nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/364318/ctinvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.