CVE-2026-2525
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to remotely cause a denial of service, making the Free5GC system unavailable. It affects versions up to 4.1.0 and can be exploited without needing physical access to the system.
Technical Description
A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the component PFCP UDP Endpoint. Such manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 16, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago
Vendor
free5gc
Product
free5gc
Related Vulnerabilities
This vulnerability allows remote attackers to crash the free5GC system by sending a specially crafted request, which puts the system in a confused state. If this happens, it can lead to service interruptions, but the attacker needs to send the malformed request to exploit this flaw.
This vulnerability allows remote attackers to crash the UPF component of free5GC, causing a denial of service by sending a specially crafted request that tricks the system into trying to use more memory than it can handle. To exploit this, the attacker needs to send a specific type of message that exceeds the expected size, leading to a system failure.
This vulnerability allows attackers to crash the AMF component of free5GC, causing a denial of service, by sending a specially crafted registration request with a specific mobile identity. The attack requires the attacker to be able to send messages to the system, which could disrupt services for legitimate users.