Description
A vulnerability has been found in Free5GC SMF up to 4.1.0. Affected by this vulnerability is the function HandlePfcpSessionReportRequest of the file internal/pfcp/handler/handler.go of the component PFCP. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. To fix this issue, it is recommended to deploy a patch.
Published: 2026-01-30
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via remote PFCP Session Report manipulation
Action: Patch Immediately
AI Analysis

Impact

A flaw in Free5GC SMF’s PFCP handler allows an attacker to craft a PFCP Session Report request that causes the HandlePfcpSessionReportRequest function to crash, resulting in a denial of service. The vulnerability does not directly expose sensitive data or credentials, but it can take the core network’s Session Management Function offline. The advisory notes that the exploit can be executed remotely and has already been publicly disclosed.

Affected Systems

Free5GC SMF versions up to 4.1.0 are affected. The issue resides in the internal/pfcp/handler/handler.go file, specifically the HandlePfcpSessionReportRequest routine. No other Free5GC components or vendors are listed as impacted.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate severity, and the EPSS score of less than 1% indicates a low current exploitation probability. The vulnerability is not part of the CISA KEV catalog, but because it can be triggered by external traffic sent to the SMF, the risk to availability remains significant. Attackers would need to target the SMF’s PFCP interface, and those already have the means to do so. Prompt patching is therefore advised to mitigate the risk.

Generated by OpenCVE AI on April 18, 2026 at 01:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest official patch for Free5GC SMF (version 4.1.0 or later) or backport the security fix from the referenced pull request.
  • If an immediate patch is not available, isolate the SMF from untrusted PFCP traffic or enforce strict firewall rules to limit access to the PFCP port.
  • Monitor SMF logs for repeated PFCP Session Report requests and look for abnormal termination patterns.
  • Implement PFCP request rate limiting or throttling to reduce the impact of a malicious flood if the patch cannot be deployed immediately.

Generated by OpenCVE AI on April 18, 2026 at 01:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
References

Tue, 17 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc free5gc
CPEs cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*
Vendors & Products Free5gc free5gc

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc smf
Vendors & Products Free5gc
Free5gc smf

Fri, 30 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Free5GC SMF up to 4.1.0. Affected by this vulnerability is the function HandlePfcpSessionReportRequest of the file internal/pfcp/handler/handler.go of the component PFCP. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. To fix this issue, it is recommended to deploy a patch.
Title Free5GC SMF PFCP handler.go HandlePfcpSessionReportRequest denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:08:30.115Z

Reserved: 2026-01-30T07:35:38.819Z

Link: CVE-2026-1683

cve-icon Vulnrichment

Updated: 2026-01-30T14:47:51.146Z

cve-icon NVD

Status : Modified

Published: 2026-01-30T14:16:07.323

Modified: 2026-02-23T10:16:18.797

Link: CVE-2026-1683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:15:05Z

Weaknesses