{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2517","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-14T20:01:26.566Z","datePublished":"2026-02-15T12:32:08.127Z","dateUpdated":"2026-02-23T10:02:19.979Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:02:19.979Z"},"title":"Open5GS SMF types.c ogs_gtp2_parse_tft denial of service","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"Open5GS","versions":[{"version":"2.7.0","status":"affected"},{"version":"2.7.1","status":"affected"},{"version":"2.7.2","status":"affected"},{"version":"2.7.3","status":"affected"},{"version":"2.7.4","status":"affected"},{"version":"2.7.5","status":"affected"},{"version":"2.7.6","status":"affected"}],"cpes":["cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*"],"modules":["SMF"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-14T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-19T16:00:59.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LinZiyu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346108","name":"VDB-346108 | Open5GS SMF types.c ogs_gtp2_parse_tft denial of service","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346108","name":"VDB-346108 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.738332","name":"Submit #738332 | Open5GS SMF v2.7.6 Denial of Service","tags":["third-party-advisory"]},{"url":"https://github.com/open5gs/open5gs/issues/4281","tags":["issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/issues/4281#issue-3807802287","tags":["exploit","issue-tracking"]},{"url":"https://github.com/open5gs/open5gs/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-17T17:23:03.082280Z","id":"CVE-2026-2517","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-17T17:23:09.474Z"}}]}}