Impact
An out-of-bounds slice access in the free5GC Converged Charging Function’s recharge endpoint causes a server panic that is converted to an HTTP 500 response. Repeated authenticated attempts can degrade recharge functionality, flood logs, and in environments lacking recovery handling, may lead to full service disruption. This represents a CWE‑129 vulnerability that impacts availability.
Affected Systems
The vulnerability affects free5GC CHF deployments running versions prior to 1.2.2. Any installation exposing the /nchf-convergedcharging/v3/recharging/:ueId endpoint to authenticated calls is potentially affected. The issue is specific to the CHF's recharge handling logic and is addressed in later releases of free5GC.
Risk and Exploitability
With a CVSS score of 7.1 and an EPSS of less than 1%, the risk is high but exploitation likelihood is low. The attack vector is an authenticated API call to a protected endpoint; an attacker who can obtain valid credentials for the SF interface can trigger the panic repeatedly. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating no widespread public exploitation yet.
OpenCVE Enrichment
Github GHSA