VYPR
Medium severity4.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8731

CVE-2026-8731

Description

A vulnerability has been found in Open5GS up to 2.7.7. Affected is the function ogs_sbi_client_add in the library /lib/sbi/client.c of the component NRF. The manipulation of the argument client_pool leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open5GS NRF crashes due to exhaustion of the SBI client pool via crafted subscription requests, enabling remote denial of service.

Vulnerability

The vulnerability resides in the NRF (Network Repository Function) component of Open5GS versions up to 2.7.7. Specifically, in the function ogs_sbi_client_add in /lib/sbi/client.c, when processing POST /nnrf-nfm/v1/subscriptions, the code allocates a new SBI client from a fixed-size pool (client_pool). If the pool is exhausted (default size 64), the function returns NULL, and the subsequent ogs_assert(client) call triggers an assertion failure, crashing the NRF process. The issue is triggered by sending multiple subscription requests with distinct notification URI hosts, each requiring a separate client [1].

Exploitation

An unauthenticated remote attacker can exploit this by sending a series of valid POST /nnrf-nfm/v1/subscriptions requests, each with a different nfStatusNotificationUri host. With the default client_pool size of 64, after 64 unique hosts, the pool is exhausted, and the next request causes a crash. No authentication is required, and the attack can be carried out over the network [1].

Impact

Successful exploitation leads to a denial of service (DoS) of the NRF function, causing the 5G core network component to crash and become unavailable. This disrupts network registration, session management, and other critical functions that rely on NRF. No data integrity or confidentiality is compromised [1].

Mitigation

As of the disclosure date, no official patch has been released by the Open5GS project (the issue was reported but not addressed). A potential workaround is to increase the SBI client pool size by adjusting the max.peer configuration parameter, which indirectly controls the pool size. Additionally, rate-limiting or filtering subscription requests can reduce the exposure. Users are advised to monitor the project for updates [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Open5gs/Open5gsreferences2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)range: <=2.7.7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.