Description
free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the UDR service, the PUT handler for updating Policy Data notification subscriptions at /nudr-dr/v2/policy-data/subs-to-notify/{subsId} does not return after request body retrieval or deserialization errors. Although HTTP 500 or 400 error responses are sent, execution continues and the processor is invoked with a potentially uninitialized or partially initialized PolicyDataSubscription object. This fail-open behavior may allow unintended modification of existing Policy Data notification subscriptions with invalid or empty input, depending on downstream processor and storage behavior. A patched version was not available at the time of publication.
Published: 2026-04-16
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Modification
Action: Assess Impact
AI Analysis

Impact

free5GC is an open‑source implementation of the 5G core network. In versions 4.2.1 and earlier of its UDR service, the PUT handler for updating Policy Data notification subscriptions at /nudr-dr/v2/policy-data/subs-to-notify/{subsId} does not terminate after encountering request body parsing errors. The handler continues processing with an uninitialized or partially initialized PolicyDataSubscription object, resulting in a fail‑open behavior that can unintentionally modify existing subscription data. This flaw corresponds to CWE-636 (Fail‑Open) and CWE-754 (Missing Input Validation) and could compromise the confidentiality and integrity of subscription records.

Affected Systems

The vulnerable component is free5gc’s UDR service, specifically versions 4.2.1 and all earlier releases. Attackers who can reach the exposed HTTP endpoint can exploit the defect on any installation running those versions; it does not depend on special authentication levels beyond normal service access.

Risk and Exploitability

The CVSS score is 6.9, indicating moderate severity. No EPSS value is available and the vulnerability is not listed in the CISA KEV catalog. Attackers may exploit the flaw by sending malformed or empty payloads to the endpoint, thereby triggering the fail‑open path. The vulnerability is remote and can be executed over the network if the endpoint is reachable, though the exact attack vector is inferred from the description.

Generated by OpenCVE AI on April 17, 2026 at 02:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched free5gc release when it becomes available
  • If a patch is delayed, restrict or block access to the /nudr-dr/v2/policy-data/subs-to-notify/{subsId} endpoint to prevent unauthorized modification
  • Monitor server logs for unauthorized or failed subscription update attempts and investigate any unexpected changes to subscription data

Generated by OpenCVE AI on April 17, 2026 at 02:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gx38-8h33-pmxr free5gc UDR fail-open request handling in PolicyDataSubsToNotifySubsIdPut may allow unintended subscription updates after input errors
History

Sat, 18 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc free5gc
Vendors & Products Free5gc
Free5gc free5gc

Thu, 16 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the UDR service, the PUT handler for updating Policy Data notification subscriptions at /nudr-dr/v2/policy-data/subs-to-notify/{subsId} does not return after request body retrieval or deserialization errors. Although HTTP 500 or 400 error responses are sent, execution continues and the processor is invoked with a potentially uninitialized or partially initialized PolicyDataSubscription object. This fail-open behavior may allow unintended modification of existing Policy Data notification subscriptions with invalid or empty input, depending on downstream processor and storage behavior. A patched version was not available at the time of publication.
Title free5gc UDR fail-open request handling in PolicyDataSubsToNotifySubsIdPut may allow unintended subscription updates after input errors
Weaknesses CWE-636
CWE-754
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-18T02:47:28.094Z

Reserved: 2026-04-10T17:31:45.786Z

Link: CVE-2026-40249

cve-icon Vulnrichment

Updated: 2026-04-18T02:47:24.325Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-16T22:16:38.793

Modified: 2026-04-17T15:38:09.243

Link: CVE-2026-40249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T02:30:07Z

Weaknesses