VYPR
Medium severity4.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8745

CVE-2026-8745

Description

A vulnerability was identified in Open5GS up to 2.7.7. Affected by this vulnerability is the function ogs_timer_add in the library /src/ausf/nausf-handler.c of the component AUSF. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Denial of service in Open5GS AUSF via timer pool exhaustion when sending repeated 5G-AKA confirmation requests with pending UDM events.

Vulnerability

A denial-of-service vulnerability exists in Open5GS up to version 2.7.7. The flaw is in the ogs_timer_add function within /src/ausf/nausf-handler.c of the AUSF component. When a valid authentication context exists and UDM holds a pending POST /nudm-ueau/v1/{supi}/auth-events request, repeated bursts of PUT /nausf-auth/v1/ue-authentications/{authCtxId}/5g-aka-confirmation exhaust the timer pool, causing ogs_timer_add to fail and leading to a crash [1].

Exploitation

An attacker must have network access to the AUSF endpoint and be able to create a valid authentication context (e.g., by initiating an authentication procedure). The exploit requires a UDM that keeps auth-events transactions pending (a fake UDM can be used). The attacker then sends multiple short-lived confirmation requests in bursts. Each request consumes a timer that is not released until the pending UDM transaction times out, eventually exhausting the timer pool [1].

Impact

Successful exploitation results in denial of service: the AUSF process crashes on an assertion failure at nausf-handler.c:115, making the AUSF instance unavailable. This disrupts authentication services for 5G core network functions that rely on AUSF.

Mitigation

As of the publication date, no fix has been released. The project has not responded to the issue report [1]. Operators should consider rate-limiting incoming requests to the AUSF or configuring downtime monitoring to detect crashes. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.