Open5GS versions up to and including 2.6.4

Ensure Open5GS is updated to a version newer than 2.6.4 (such as version 2.7.0 or later), where this assertion logic has been hardened.

When the system processes this malicious packet, it hits the failed assertion and shuts down. In a mobile network environment, this results in a Denial of Service , potentially cutting off connectivity for users serviced by that core. Recommendations

The vulnerability stems from a "reachable assertion" within the nas_eps_send_emm_to_esm function. In software development, an assertion is a check that the code assumes to be true; if it fails, the program usually crashes immediately to prevent further errors.

Typically rated as high, as it impacts the availability of core mobile network functions. Technical Breakdown

An attacker can trigger this crash by sending a specially crafted NGAP packet (Next Generation Application Protocol) to the system.

24429mp4 May 2026

Open5GS versions up to and including 2.6.4

Ensure Open5GS is updated to a version newer than 2.6.4 (such as version 2.7.0 or later), where this assertion logic has been hardened.

When the system processes this malicious packet, it hits the failed assertion and shuts down. In a mobile network environment, this results in a Denial of Service , potentially cutting off connectivity for users serviced by that core. Recommendations

The vulnerability stems from a "reachable assertion" within the nas_eps_send_emm_to_esm function. In software development, an assertion is a check that the code assumes to be true; if it fails, the program usually crashes immediately to prevent further errors.

Typically rated as high, as it impacts the availability of core mobile network functions. Technical Breakdown

An attacker can trigger this crash by sending a specially crafted NGAP packet (Next Generation Application Protocol) to the system.