Untriaged
Permalink
CVE-2026-2522
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
Open5GS MME esm-build.c memory corruption
A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is an unknown function of the file /src/mme/esm-build.c of the component MME. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
-
-
Submit #738336 | Open5GS MME v2.7.6 Buffer Overflow third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4283 issue-tracking
-
-
-
Submit #738336 | Open5GS MME v2.7.6 Buffer Overflow third-party-advisory
-
https://github.com/open5gs/open5gs/issues/4283 issue-tracking
-
Affected products
Open5GS
- ==2.7.6
- ==2.7.3
- ==2.7.5
- ==2.7.0
- ==2.7.2
- ==2.7.4
- ==2.7.1
Matching in nixpkgs
pkgs.open5gs
4G/5G core network components
Package maintainers
-
@Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com>
-
@xddxdd Yuhui Xu <b980120@hotmail.com>