No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in omec-project amf up to 2.1.3-dev. Impacted is the function NGSetupRequest of the file ngap/handler.go. Executing a manipulation of the argument InformationElement can lead to memory corruption. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.2.0 is recommended to address this issue. The affected component should be upgraded. The same pull request fixes multiple security issues. | |
| Title | omec-project amf handler.go NGSetupRequest memory corruption | |
| First Time appeared |
Omec-project
Omec-project amf |
|
| Weaknesses | CWE-119 | |
| CPEs | cpe:2.3:a:omec-project:amf:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Omec-project
Omec-project amf |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-18T01:15:12.132Z
Reserved: 2026-05-17T09:55:52.168Z
Link: CVE-2026-8779
No data.
Status : Received
Published: 2026-05-18T02:16:37.180
Modified: 2026-05-18T02:16:37.180
Link: CVE-2026-8779
No data.
OpenCVE Enrichment
No data.