Description
A vulnerability was identified in Free5GC up to 4.1.0. This affects the function ResolveNodeIdToIp of the file internal/sbi/processor/datapath.go of the component SMF. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. It is recommended to apply a patch to fix this issue.
Published: 2026-02-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability originates in the ResolveNodeIdToIp function within the SMF component of Free5GC versions up to 4.1.0. By supplying crafted input, an attacker can trigger a denial of service that prevents the SMF from processing subsequent requests. The flaw involves unchecked resource handling and is classified as CWE-404. The result is loss of service for the SMF and the control plane services it supports.

Affected Systems

Affected systems include deployments of the Free5GC open‑source 5G core network stack, specifically releases up to and including 4.1.0. The vulnerability resides in the internal/sbi/processor/datapath.go file of the SMF component. Users running any version earlier than 4.1.1 should consider the system vulnerable. No specific platform or OS constraints are indicated.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity and the EPSS score of less than 1% suggests a low probability of exploitation, though a publicly available exploit script can cause a denial of service. Attackers can remotely target the SMF over the network, and prior evidence shows that the issue can be triggered without authentication. While not listed in CISA's KEV catalog, a loss of SMF availability can disrupt subscriber sessions and overall network performance, making it a high‑impact threat for operators.

Generated by OpenCVE AI on April 17, 2026 at 22:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Free5GC to version 4.1.1 or later, which includes the fix to ResolveNodeIdToIp.
  • Restrict SMF API access so that only trusted control plane entities can invoke ResolveNodeIdToIp, limiting exposure to the exploitation vector.
  • Implement a rate‑limiting or watchdog mechanism on the SMF service to detect and recover from repeated resolution failures, reducing the impact of a potential denial of service attempt.

Generated by OpenCVE AI on April 17, 2026 at 22:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*

Fri, 06 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc free5gc
Vendors & Products Free5gc
Free5gc free5gc

Fri, 06 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Free5GC up to 4.1.0. This affects the function ResolveNodeIdToIp of the file internal/sbi/processor/datapath.go of the component SMF. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. It is recommended to apply a patch to fix this issue.
Title Free5GC SMF datapath.go ResolveNodeIdToIp denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:19:59.954Z

Reserved: 2026-02-05T13:33:48.056Z

Link: CVE-2026-1974

cve-icon Vulnrichment

Updated: 2026-02-06T19:33:03.039Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T02:16:05.810

Modified: 2026-02-09T15:47:30.140

Link: CVE-2026-1974

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:00:12Z

Weaknesses