Impact
A malformed PFCP SessionReportRequest that sets ReportType.DLDR but omits the required DownlinkDataReport Information Element causes a nil pointer dereference in free5GC SMF, leading to a panic and the termination of the SMF process. This results in a denial of service for the SMF component and potentially disrupts the upstream negotiation and ongoing service sessions in the 5G core network.
Affected Systems
The vulnerability affects the free5gc SMF component, versions up to and including 1.4.1. The impact is limited to installations of this software that expose the PFCP interface on UDP port 8805 to external traffic.
Risk and Exploitability
The CVSS base score of 6.6 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of active exploitation at present. The vulnerability is not listed in the CISA KEV catalog. An attacker can exploit it by remotely sending a crafted PFCP SessionReportRequest message to the SMF PFCP interface; proper authentication or additional remote code execution is not required. The crash is deterministic once the malformed message is processed, exposing the SMF to repeated denial of service attacks.
OpenCVE Enrichment