No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc free5gc
|
|
| CPEs | cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Free5gc free5gc
|
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc
Free5gc smf |
|
| Vendors & Products |
Free5gc
Free5gc smf |
Fri, 30 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Free5GC SMF up to 4.1.0. Affected by this vulnerability is the function HandlePfcpSessionReportRequest of the file internal/pfcp/handler/handler.go of the component PFCP. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. To fix this issue, it is recommended to deploy a patch. | |
| Title | Free5GC SMF PFCP handler.go HandlePfcpSessionReportRequest denial of service | |
| Weaknesses | CWE-404 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-30T14:48:18.216Z
Reserved: 2026-01-30T07:35:38.819Z
Link: CVE-2026-1683
Updated: 2026-01-30T14:47:51.146Z
Status : Analyzed
Published: 2026-01-30T14:16:07.323
Modified: 2026-02-17T19:23:47.940
Link: CVE-2026-1683
No data.
OpenCVE Enrichment
Updated: 2026-02-02T09:27:25Z