CVE-2026-1736
📋 TL;DR
A reachable assertion vulnerability in Open5GS SGWC component allows remote attackers to cause denial of service by sending specially crafted requests. This affects Open5GS deployments up to version 2.7.6 that have the SGWC component exposed. The vulnerability is in the S11 interface handling code.
💻 Affected Systems
- Open5GS
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service for SGWC component, disrupting 5G core network functionality and affecting subscriber connectivity.
Likely Case
Service disruption for the SGWC component requiring restart, potentially affecting multiple subscribers until service is restored.
If Mitigated
Minimal impact if proper network segmentation and access controls prevent unauthorized access to SGWC interfaces.
🎯 Exploit Status
Exploit has been publicly disclosed in GitHub issues. Attack requires network access to SGWC S11 interface but no authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.7.7 or later
Vendor Advisory: https://github.com/open5gs/open5gs/issues/4270
Restart Required: Yes
Instructions:
1. Update Open5GS to version 2.7.7 or later. 2. Pull latest code from GitHub repository. 3. Rebuild and reinstall Open5GS. 4. Restart all Open5GS services.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to SGWC S11 interface to only trusted MME components
iptables -A INPUT -p tcp --dport 2123 -s <trusted_mme_ip> -j ACCEPT
iptables -A INPUT -p tcp --dport 2123 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate SGWC component from untrusted networks
- Deploy intrusion detection/prevention systems to monitor for exploitation attempts on S11 interface
🔍 How to Verify
Check if Vulnerable:
Check Open5GS version: open5gs --version. If version is 2.7.6 or earlier, system is vulnerable.
Check Version:
open5gs --version
Verify Fix Applied:
Verify version is 2.7.7 or later and test SGWC functionality with legitimate S11 requests.
📡 Detection & Monitoring
Log Indicators:
- SGWC process crashes
- Assertion failures in sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request
- Unexpected S11 interface disconnections
Network Indicators:
- Malformed GTP-C messages on port 2123
- Unexpected traffic patterns to SGWC S11 interface
SIEM Query:
source="open5gs" AND ("assertion" OR "crash" OR "sgwc")
🔗 References
- https://github.com/open5gs/open5gs/
- https://github.com/open5gs/open5gs/issues/4270
- https://github.com/open5gs/open5gs/issues/4270#event-21968624624
- https://github.com/open5gs/open5gs/issues/4270#issue-3795141303
- https://vuldb.com/?ctiid.343635
- https://vuldb.com/?id.343635
- https://vuldb.com/?submit.741191