{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1522","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-28T10:14:15.433Z","datePublished":"2026-01-28T16:32:07.267Z","dateUpdated":"2026-02-23T09:00:29.743Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:00:29.743Z"},"title":"Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"Open5GS","versions":[{"version":"2.7.0","status":"affected"},{"version":"2.7.1","status":"affected"},{"version":"2.7.2","status":"affected"},{"version":"2.7.3","status":"affected"},{"version":"2.7.4","status":"affected"},{"version":"2.7.5","status":"affected"},{"version":"2.7.6","status":"affected"}],"cpes":["cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*"],"modules":["SGWC"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Open5GS up to 2.7.6. This vulnerability affects the function sgwc_s5c_handle_modify_bearer_response of the file src/sgwc/s5c-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This patch is called b19cf6a. Applying a patch is advised to resolve this issue. The issue report is flagged as already-fixed."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-01-11T00:00:00.000Z","lang":"en","value":"Countermeasure disclosed"},{"time":"2026-01-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-03T09:35:54.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"FrankyLin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343193","name":"VDB-343193 | Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343193","name":"VDB-343193 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.738371","name":"Submit #738371 | Open5GS SGWC v2.7.6 Denial of Service","tags":["third-party-advisory"]},{"url":"https://github.com/open5gs/open5gs/issues/4266","tags":["issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/issues/4266#event-21968568116","tags":["issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/issues/4266#issue-3794991595","tags":["exploit","issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/commit/b19cf6a","tags":["patch"]},{"url":"https://github.com/open5gs/open5gs/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-28T16:41:46.515115Z","id":"CVE-2026-1522","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-28T16:42:10.044Z"}}]}}