CVE-2026-2524
Published: 16 February 2026
Summary
CVE-2026-2524 is a medium-severity Improper Resource Shutdown or Release (CWE-404) vulnerability in Open5Gs Open5Gs. Its CVSS base score is 5.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 13.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Contingency plan updates incorporate proper resource shutdown and release steps, preventing attackers from leveraging incomplete cleanup during recovery scenarios.
Mandates explicit shutdown of the network connection at session conclusion, directly addressing improper resource release.
Requires proper shutdown/release procedures that include overwriting or isolating data to block unintended transfer via reused system objects.
Procedures can mandate orderly shutdown or release of resources when failures occur, preventing improper resource handling after a fault.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of improper resource handling (CWE-404) in MME component directly enables application/system crash for availability impact, matching T1499.004.
NVD Description
A flaw has been found in Open5GS 2.7.6. The impacted element is the function mme_s11_handle_create_session_response of the component MME. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been published and may be used.…
more
The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-2524 is a vulnerability in Open5GS version 2.7.6, affecting the mme_s11_handle_create_session_response function within the MME component. The flaw enables a denial of service condition through improper resource handling, classified under CWE-404.
An unauthenticated remote attacker can exploit this vulnerability with low attack complexity, as reflected in its CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). Exploitation disrupts availability to a low degree without impacting confidentiality or integrity.
The Open5GS project was notified early via GitHub issue #4284 but has not responded as of the CVE publication on 2026-02-16. An exploit has been published and may be used, with further details available in the project's GitHub repository (https://github.com/open5gs/open5gs/) and VulDB entries (https://vuldb.com/?ctiid.346112, https://vuldb.com/?id.346112). No patches or specific mitigations are detailed in the available references.
Details
- CWE(s)