| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-4988 | Open5GS CCA Message smf_s6b denial of service | - | Open5GS | Low | 3.7 | 2026-03-27 21:27:16 | Deep Dive |
| CVE-2026-4240 | Open5GS CCA smf_s6b_sta_cb denial of service | - | Open5GS | Medium | 5.3 | 2026-03-16 13:32:10 | Deep Dive |
| CVE-2026-2524 | Open5GS MME mme_s11_handle_create_session_response denial of service | - | Open5GS | Medium | 5.3 | 2026-02-16 00:32:07 | Deep Dive |
| CVE-2026-2523 | Open5GS SMF gn-handler.c smf_gn_handle_create_pdp_context_request assertion | - | Open5GS | Medium | 5.3 | 2026-02-16 00:02:08 | Deep Dive |
| CVE-2026-2522 | Open5GS MME esm-build.c memory corruption | - | Open5GS | Medium | 5.3 | 2026-02-15 23:32:07 | Deep Dive |
| CVE-2026-2521 | Open5GS SGW-C sgwc_s5c_handle_create_session_response memory corruption | - | Open5GS | Medium | 5.3 | 2026-02-15 23:02:07 | Deep Dive |
| CVE-2026-2517 | Open5GS SMF types.c ogs_gtp2_parse_tft denial of service | - | Open5GS | Medium | 5.3 | 2026-02-15 12:32:08 | Deep Dive |
| CVE-2026-2062 | Open5GS PGW S5U Address sgwc_sxa_handle_session_modification_response null pointer dereference | - | Open5GS | Medium | 5.3 | 2026-02-06 18:32:08 | Deep Dive |
| CVE-2025-15555 | Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_mar_cb stack-based overflow | - | Open5GS | High | 7.3 | 2026-02-04 20:32:07 | Deep Dive |
| CVE-2026-1738 | Open5GS SGWC context.c sgwc_tunnel_add assertion | - | Open5GS | Medium | 5.3 | 2026-02-02 01:32:07 | Deep Dive |
| CVE-2026-1737 | Open5GS CreateBearerRequest s5c-handler.c sgwc_s5c_handle_create_bearer_request assertion | - | Open5GS | Medium | 5.3 | 2026-02-02 01:02:07 | Deep Dive |
| CVE-2026-1736 | Open5GS SGWC s11-handler.c assertion | - | Open5GS | Medium | 5.3 | 2026-02-02 00:32:07 | Deep Dive |
| CVE-2026-1587 | Open5GS SGWC s11-handler.c sgwc_s11_handle_modify_bearer_request denial of service | - | Open5GS | Medium | 5.3 | 2026-01-29 12:32:08 | Deep Dive |
| CVE-2026-1586 | Open5GS SGWC s11-handler.c ogs_gtp2_f_teid_to_ip denial of service | - | Open5GS | Medium | 5.3 | 2026-01-29 12:32:06 | Deep Dive |
| CVE-2026-1522 | Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service | - | Open5GS | Medium | 5.3 | 2026-01-28 16:32:07 | Deep Dive |
| CVE-2026-1521 | Open5GS SGWC s5c-handler.c denial of service | - | Open5GS | Medium | 5.3 | 2026-01-28 14:32:10 | Deep Dive |
| CVE-2026-0622 | Open 5GS WebUI uses a hard-coded JWT signing key | NewPlane | open5GS | - | - | 2026-01-20 19:56:05 | Deep Dive |
| CVE-2025-15539 | Open5GS sgwc s11-handler.c sgwc_s11_handle_downlink_data_notification_ack denial of service | - | Open5GS | Medium | 5.3 | 2026-01-18 23:32:07 | Deep Dive |
| CVE-2025-15532 | Open5GS Timer resource consumption | - | Open5GS | Medium | 5.3 | 2026-01-17 16:32:08 | Deep Dive |
| CVE-2025-15531 | Open5GS context.c sgwc_bearer_add assertion | - | Open5GS | Medium | 5.3 | 2026-01-17 16:02:08 | Deep Dive |