CVE-2025-70122
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows remote attackers to crash the UPF component of free5GC, causing a denial of service by sending a specially crafted request that tricks the system into trying to use more memory than it can handle. To exploit this, the attacker needs to send a specific type of message that exceeds the expected size, leading to a system failure.
Technical Description
A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted PFCP Session Modification Request. The issue occurs in the SDFFilterFields.UnmarshalBinary function (sdf-filter.go) when processing a declared length that exceeds the actual buffer capacity, leading to a runtime panic and UPF crash.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 13, 2026
7 days ago
Last Modified
Feb 18, 2026
2 days ago
Vendor
free5gc
Product
free5gc
Related Vulnerabilities
This vulnerability allows remote attackers to crash the free5GC system by sending a specially crafted request, which puts the system in a confused state. If this happens, it can lead to service interruptions, but the attacker needs to send the malformed request to exploit this flaw.
This vulnerability allows attackers to crash the AMF component of free5GC, causing a denial of service, by sending a specially crafted registration request with a specific mobile identity. The attack requires the attacker to be able to send messages to the system, which could disrupt services for legitimate users.