Description
A vulnerability was found in Free5GC SMF up to 4.1.0. Affected by this issue is the function HandleReports of the file /internal/context/pfcp_reports.go of the component PFCP UDP Endpoint. The manipulation results in denial of service. The attack can be executed remotely. It is advisable to implement a patch to correct this issue.
Published: 2026-01-30
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the HandleReports function within the PFCP UDP Endpoint of Free5GC SMF. A malformed PFCP report, when processed, can cause the SMF to crash or become unresponsive, resulting in a denial of service. The weakness is a faulty handling of PFCP messages and is classified as CWE-404. Consequently, an attacker can interrupt normal SMF operations and deny service to users relying on the network.

Affected Systems

This flaw affects Free5GC SMF versions up to 4.1.0. The issue is confined to the Free5GC SMF component, which implements the PFCP protocol over UDP. Administrators should verify that their deployed SMF does not run a version earlier than 4.1.1 and that the build is sourced from the official Free5GC repository.

Risk and Exploitability

The CVSS v3 score of 6.9 indicates a medium severity that can affect availability. Although the EPSS score is below 1 %, suggesting a low overall exploitation probability, the vulnerability is remotely exploitable via crafted PFCP UDP packets, removing the need for local access or privileged credentials. The flaw is not listed in CISA’s KEV catalog, implying no widespread known exploits at present. Nevertheless, the remote nature and potential for service disruption warrant immediate attention, especially in production 5G core networks that rely on Free5GC SMF.

Generated by OpenCVE AI on April 18, 2026 at 01:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch provided in Free5GC’s GitHub pull request 188 or upgrade to Free5GC SMF version 4.1.1 or later.
  • If an immediate patch is unavailable, limit PFCP UDP traffic to known SMF peers using a firewall or bind the SMF process to a trusted interface.
  • Monitor SMF logs for repeated PFCP report failures and schedule a graceful reboot or restart of the SMF service if crashes persist.

Generated by OpenCVE AI on April 18, 2026 at 01:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
References

Tue, 17 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc free5gc
CPEs cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*
Vendors & Products Free5gc free5gc

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc smf
Vendors & Products Free5gc
Free5gc smf

Fri, 30 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Free5GC SMF up to 4.1.0. Affected by this issue is the function HandleReports of the file /internal/context/pfcp_reports.go of the component PFCP UDP Endpoint. The manipulation results in denial of service. The attack can be executed remotely. It is advisable to implement a patch to correct this issue.
Title Free5GC SMF PFCP UDP Endpoint pfcp_reports.go HandleReports denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:08:43.099Z

Reserved: 2026-01-30T07:35:57.699Z

Link: CVE-2026-1684

cve-icon Vulnrichment

Updated: 2026-01-30T14:59:21.557Z

cve-icon NVD

Status : Modified

Published: 2026-01-30T15:16:08.790

Modified: 2026-02-23T10:16:18.970

Link: CVE-2026-1684

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:15:05Z

Weaknesses