PatchSiren cyber security CVE debrief
CVE-2026-8731 Open5gs CVE debrief
CVE-2026-8731 describes a denial-of-service flaw in Open5GS’s NRF component, specifically in ogs_sbi_client_add within lib/sbi/client.c. The issue is reported as remotely reachable, publicly disclosed, and tied to manipulation of client_pool, with the supplied NVD record assigning CWE-404 and a low CVSS 4.0 score of 2.1.
- Vendor
- Open5gs
- Product
- Unknown
- CVSS
- LOW 2.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-17
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-17
- Advisory updated
- 2026-05-18
Who should care
Operators and integrators running Open5GS, especially environments exposing NRF/SBI interfaces or allowing low-privileged access paths. Telecom core teams and service providers should also track it because the impact is availability-focused and the issue is publicly disclosed.
Technical summary
The supplied CVE data says that altering the client_pool argument in ogs_sbi_client_add can lead to denial of service in Open5GS NRF. NVD metadata marks the record as Received and includes a CVSS v4.0 vector with network reachability, low attack complexity, low privileges, no user interaction, and availability impact, along with CWE-404.
Defensive priority
Moderate for exposed Open5GS deployments. Although the CVSS score is low, the issue affects a core network-facing function and has a public disclosure, so environments using NRF should validate exposure and track remediation promptly.
Recommended defensive actions
- Inventory Open5GS deployments and confirm whether any instance is running version 2.7.7 or earlier.
- Check whether NRF/SBI access is exposed to untrusted networks or low-privileged users.
- Restrict and segment access to NRF and related SBI interfaces until a fix is available.
- Monitor upstream Open5GS issue 4464 and the NVD/CVE records for patch or remediation updates.
- Apply vendor or project updates as soon as a fixed release is published.
- Watch for abnormal NRF behavior or repeated service interruption indicators in logs and monitoring systems.
Evidence notes
The supplied corpus links the issue to Open5GS via the upstream repository reference and GitHub issue 4464, while the NVD record shows the CVE as Received. The reported impact is denial of service in ogs_sbi_client_add (/lib/sbi/client.c) through manipulation of client_pool, with CWE-404 listed in the source metadata and a CVSS v4.0 score of 2.1/LOW.
Official resources
-
CVE-2026-8731 CVE record
CVE.org
-
CVE-2026-8731 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
[email protected] - Product
-
Source reference
[email protected] - Exploit, Issue Tracking
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Source reference
[email protected] - Permissions Required, VDB Entry
Publicly disclosed; the supplied description says the project was informed early via an issue report and had not responded yet at the time of the source.