The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests. An unauthenticated remote attacker can send a request with a very large SEID (e.g., 0xFFFFFFFFFFFFFFFF) that causes an integer conversion/underflow in LocalNode.DeleteSess() / LocalNode.Sess() when a uint64 SEID is converted to int and used in index arithmetic. This leads to a negative index into n.sess and a Go runtime panic, resulting in a denial of service (UPF crash). The issue has been reproduced on free5GC v4.1.0 with crashes observed in the session lookup/deletion path in internal/pfcp/node.go; other versions may also be affected. No authentication is required.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 07 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc free5gc
CPEs cpe:2.3:a:free5gc:free5gc:4.1.0:*:*:*:*:*:*:*
Vendors & Products Free5gc free5gc

Fri, 19 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-129
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc upf
Vendors & Products Free5gc
Free5gc upf

Thu, 18 Dec 2025 19:00:00 +0000

Type Values Removed Values Added
Description The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests. An unauthenticated remote attacker can send a request with a very large SEID (e.g., 0xFFFFFFFFFFFFFFFF) that causes an integer conversion/underflow in LocalNode.DeleteSess() / LocalNode.Sess() when a uint64 SEID is converted to int and used in index arithmetic. This leads to a negative index into n.sess and a Go runtime panic, resulting in a denial of service (UPF crash). The issue has been reproduced on free5GC v4.1.0 with crashes observed in the session lookup/deletion path in internal/pfcp/node.go; other versions may also be affected. No authentication is required.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-19T18:01:34.231Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65562

cve-icon Vulnrichment

Updated: 2025-12-19T17:31:31.168Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-18T19:16:33.747

Modified: 2026-01-07T21:01:21.407

Link: CVE-2025-65562

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-19T09:18:02Z

Weaknesses