Impact
An incomplete path validation in the free5gc UDR service allows an unauthenticated attacker to create or overwrite Traffic Influence Subscriptions, regardless of the influenceId supplied. This flaw enables an attacker to inject arbitrary notificationUri values and SUPIs, potentially redirecting traffic or exfiltrating data. The vulnerability is a form of improper access control and path injection (CWE-285 and CWE-636), providing the attacker with elevated control over subscription mechanisms without authentication.
Affected Systems
The issue affects the free5gc UDR service version 4.2.1 and any older releases. No official patch was available at the time of disclosure, and the vulnerability remains in all affected deployments that have not been updated.
Risk and Exploitability
The CVSS score of 8.7 signifies high severity. Although EPSS data is not available, the vulnerability is exploitable via the 5G Service Based Interface without authentication. The lack of a KEV listing does not diminish the risk; any system exposing the UDR may be vulnerable. Attackers can create or modify subscriptions remotely, potentially compromising data integrity and confidentiality in the network.
OpenCVE Enrichment
Github GHSA