CVE-2026-8779

medium

Description

A vulnerability was determined in omec-project amf up to 2.1.3-dev. Impacted is the function NGSetupRequest of the file ngap/handler.go. Executing a manipulation of the argument InformationElement can lead to memory corruption. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.2.0 is recommended to address this issue. The affected component should be upgraded. The same pull request fixes multiple security issues.

References

https://vuldb.com/vuln/364403/cti

https://vuldb.com/vuln/364403

https://vuldb.com/submit/811616

https://github.com/omec-project/amf/releases/tag/v2.2.0

https://github.com/omec-project/amf/pull/666

https://github.com/omec-project/amf/issues/671

https://github.com/omec-project/amf/

Details

Source: Mitre, NVD

Published: 2026-05-18

Updated: 2026-05-18

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Severity: Medium

CVSS v4

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Severity: Medium