Description
Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions 4.2.1 and below contain an information disclosure vulnerability in the UDR (Unified Data Repository) service. The handler for GET /nudr-dr/v2/application-data/influenceData/subs-to-notify sends an HTTP 400 error response when required query parameters are missing but does not return afterward. Execution continues into the processor function, which queries the data repository and appends the full list of Traffic Influence Subscriptions, including SUPI/IMSI values, to the response body. An unauthenticated attacker with network access to the 5G Service Based Interface can retrieve stored subscriber identifiers with a single parameterless HTTP GET request. The SUPI is the most sensitive subscriber identifier in 5G networks, and its exposure undermines the privacy guarantees of the 3GPP SUCI concealment mechanism at the core network level. A similar bypass exists when sending a malformed snssai parameter due to the same missing return pattern.
Published: 2026-04-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure of Subscriber Identifiers
Action: Apply Patch
AI Analysis

Impact

Free5GC's Unified Data Repository (UDR) service includes a logic flaw that causes the handler for GET /nudr-dr/v2/application-data/influenceData/subs-to-notify to return an HTTP 400 error when required query parameters are missing but fail to stop execution. The subsequent processing continues, retrieving the full list of Traffic Influence Subscriptions and appending sensitive SUPI and IMSI values to the response body. The attacker does not need any authentication to exploit this path, resulting in a privacy‑breaching disclosure of highly sensitive subscriber identifiers that undermines the 3GPP SUCI concealment mechanism at the core network level.

Affected Systems

The vulnerability affects Free5GC versions 4.2.1 and older, specifically the UDR service. An unauthenticated attacker with network access to the 5G Service‑Based Interface can trigger the flaw by sending a standard HTTP GET request to the vulnerable endpoint.

Risk and Exploitability

The flaw carries a CVSS score of 7.5 (High). No EPSS score is published, and the issue is not listed in the CISA KEV catalog. Because the vulnerability is exploitable over the network without authentication, an attacker can send a parameter‑less or malformed snssai GET request and immediately receive the list of subscriber identifiers, making exploitation trivial for anyone with network visibility to the service.

Generated by OpenCVE AI on April 16, 2026 at 02:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Free5GC version 4.2.2 or later once the vendor releases a patch.
  • If a patch is not yet available, apply the released source code fix that inserts a return after the error response to stop further processing.
  • Restrict network access to the UDR endpoint by isolating it behind a firewall, VPN, or by limiting it to the authorized service‑based interfaces, thereby preventing unauthenticated external requests.

Generated by OpenCVE AI on April 16, 2026 at 02:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wrwh-rpq4-87hf free5gc UDR nudr-dr influenceData/subs-to-notify leaks SUPI in error response body without authentication
History

Thu, 16 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc free5gc
Vendors & Products Free5gc
Free5gc free5gc

Wed, 15 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions 4.2.1 and below contain an information disclosure vulnerability in the UDR (Unified Data Repository) service. The handler for GET /nudr-dr/v2/application-data/influenceData/subs-to-notify sends an HTTP 400 error response when required query parameters are missing but does not return afterward. Execution continues into the processor function, which queries the data repository and appends the full list of Traffic Influence Subscriptions, including SUPI/IMSI values, to the response body. An unauthenticated attacker with network access to the 5G Service Based Interface can retrieve stored subscriber identifiers with a single parameterless HTTP GET request. The SUPI is the most sensitive subscriber identifier in 5G networks, and its exposure undermines the privacy guarantees of the 3GPP SUCI concealment mechanism at the core network level. A similar bypass exists when sending a malformed snssai parameter due to the same missing return pattern.
Title Free5GC: UDR nudr-dr influenceData/subs-to-notify leaks SUPI in error response body without authentication
Weaknesses CWE-200
CWE-202
CWE-209
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-16T12:04:46.694Z

Reserved: 2026-04-10T17:31:45.786Z

Link: CVE-2026-40245

cve-icon Vulnrichment

Updated: 2026-04-16T11:13:26.218Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-16T00:16:29.060

Modified: 2026-04-17T15:38:09.243

Link: CVE-2026-40245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:15:21Z

Weaknesses