CVE-2026-8224 — Denial of Service

CVE-2026-8224 — Denial of Service

CVE-2026-8224 — A vulnerability was determined in Open5GS up to 2.7.7. Affected by this issue is the function pcf_sess_set_ipv6prefix of the file /src/pcf/context.c of the component PCF. Executing a manipulation of the argument SmPolicyContextData.ipv6AddressPrefix can lead to denial of service. It

What This Means For You

  • If your environment is affected by CWE-404, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-8224 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-8224 - Open5GS PCF IPv6 Prefix DoS

Sigma YAML — free preview
title: CVE-2026-8224 - Open5GS PCF IPv6 Prefix DoS
id: scw-2026-05-10-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-8224 by targeting the pcf_sess_set_ipv6prefix function in Open5GS. The rule looks for specific URI paths and query parameters related to the manipulation of the SmPolicyContextData.ipv6AddressPrefix, which is the vector for the denial of service vulnerability. This is a critical detection for initial access via this specific vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-10
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-8224/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/pcf/context.c'
      cs-uri-query|contains:
          - 'SmPolicyContextData.ipv6AddressPrefix='
      cs-method:
          - 'POST'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-8224 vulnerability CVE-2026-8224
CWE-404 weakness CWE-404
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 10, 2026 at 06:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-8223 — Open5GS Denial of Service

CVE-2026-8223 — A vulnerability was found in Open5GS up to 2.7.7. Affected by this vulnerability is the function pcf_sess_sbi_discover_and_send of the component sm-policies Endpoint. Performing...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-404
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-8222 — Open5GS Denial of Service

CVE-2026-8222 — A vulnerability has been found in Open5GS up to 2.7.7. Affected is the function pcf_nbsf_management_handle_register of the file src/pcf/nbsf-handler.c of the component sm-policies...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-404
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-8217 — Industrial Application Software IAS Canias ERP Command Injection

CVE-2026-8217 — A security flaw has been discovered in Industrial Application Software IAS Canias ERP 8.03. Impacted is the function Runtime.getRuntime.exec of the component RMI...

vulnerabilityCVEmedium-severitycommand-injectioncwe-77cwe-78
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 6 Sigma