Description
A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the component PFCP UDP Endpoint. Such manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-16
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

Free5GC, a 5G core network implementation, contains a flaw in the PFCP UDP Endpoint component. The flaw, classified as CWE‑404, results in a denial of service when the affected function processes crafted data. An attacker who can reach the endpoint remotely can trigger the failure, causing service interruption for the affected PFCP interface.

Affected Systems

Any installation of Free5GC version 4.1.0 or earlier is susceptible. The vulnerability arises from an unspecified function within the PFCP UDP Endpoint module. Users running these versions should assess whether the PFCP service is exposed to external networks.

Risk and Exploitability

With a CVSS score of 6.9 the issue is considered medium severity, and the EPSS score of less than 1 % indicates a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, but an exploit has been publicly disclosed and may be used. The attack vector is remote, owing to the use of UDP, and would require the attacker to send a specially crafted packet to the vulnerable endpoint.

Generated by OpenCVE AI on April 18, 2026 at 12:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Free5GC to the latest release, which removes the flaw in the PFCP UDP Endpoint component.
  • If an upgrade is not immediately possible, configure network policies or the Free5GC firewall settings to block unsolicited UDP traffic to the PFCP port, thereby limiting exposure to the exposed endpoint.
  • Review PFCP configuration and disable the UDP endpoint if the service is not required in the deployment.

Generated by OpenCVE AI on April 18, 2026 at 12:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc free5gc
Vendors & Products Free5gc
Free5gc free5gc

Mon, 16 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the component PFCP UDP Endpoint. Such manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title Free5GC PFCP UDP Endpoint denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:03:24.272Z

Reserved: 2026-02-15T08:45:10.248Z

Link: CVE-2026-2525

cve-icon Vulnrichment

Updated: 2026-02-17T17:16:16.391Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T02:16:06.153

Modified: 2026-02-19T19:48:12.000

Link: CVE-2026-2525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses