Impact
A flaw in Free5GC’s pfcp_reports.go function identityTriggerType can lead to a null pointer dereference. The resulting crash disrupts the PFCP processing component, potentially causing a loss of service availability. The vulnerability is exploitable remotely, and publicly disclosed exploits may trigger the crash for an attacker. The impact is primarily disruptive.
Affected Systems
The vulnerability affects all Free5GC releases up to and including version 4.1.0. Administrators running these versions should review their deployment versions and plan an upgrade.
Risk and Exploitability
The flaw carries a CVSS score of 6.9, indicating moderate severity. The EPSS score is below 1%, implying a low exploitation probability at this time. The vulnerability is not listed in the CISA KEV catalog. It can be triggered over the network by a remote attacker, suggesting that exposed PFCP endpoints may be targeted. Due to the low exploitation probability, the immediate risk is moderate, but the potential service disruption warrants prompt remediation.
OpenCVE Enrichment