CVE-2025-70123
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows remote attackers to crash the free5GC system by sending a specially crafted request, which puts the system in a confused state. If this happens, it can lead to service interruptions, but the attacker needs to send the malformed request to exploit this flaw.
Technical Description
An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This places the UPF in an inconsistent state where a subsequent valid PFCP Session Establishment Request triggers a cascading failure, disrupting the SMF connection and causing service degradation.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 13, 2026
7 days ago
Last Modified
Feb 18, 2026
2 days ago
Vendor
free5gc
Product
free5gc
Related Vulnerabilities
This vulnerability allows remote attackers to crash the UPF component of free5GC, causing a denial of service by sending a specially crafted request that tricks the system into trying to use more memory than it can handle. To exploit this, the attacker needs to send a specific type of message that exceeds the expected size, leading to a system failure.
This vulnerability allows attackers to crash the AMF component of free5GC, causing a denial of service, by sending a specially crafted registration request with a specific mobile identity. The attack requires the attacker to be able to send messages to the system, which could disrupt services for legitimate users.