Description
free5GC UDR is the Policy Control Function (PCF) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. A memory leak vulnerability in versions prior to 1.4.3 allows any unauthenticated attacker with network access to the PCF SBI interface to cause uncontrolled memory growth by sending repeated HTTP requests to the OAM endpoint. The root cause is a `router.Use()` call inside an HTTP handler that registers a new CORS middleware on every incoming request, permanently growing the Gin router's handler chain. This leads to progressive memory exhaustion and eventual Denial of Service of the PCF, preventing all UEs from obtaining AM and SM policies and blocking 5G session establishment. Version 1.4.3 contains a patch.
Published: 2026-04-21
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

Free5GC PCF suffers a memory‑leak flaw caused by registering a new CORS middleware on every request to the OAM endpoint. The leak grows the Gin router handler chain without bounds, eventually exhausting system memory and rendering the PCF incapable of delivering AM and SM policies. Because the PCF refuses to provide these policies, UEs cannot establish 5G sessions, effectively denying network service to all users.

Affected Systems

Vendors: free5gc:pcf. All releases prior to version 1.4.3 are vulnerable. These versions can be found in the free5GC project's PCF component. The vulnerability was discovered in the open‑source PCF implementation; the fixed code was shipped in release 1.4.3.

Risk and Exploitability

CVSS score 7.5 signifies high impact; EPSS not available, and it is not listed in KEV, implying no known widespread exploitation. The flaw can be triggered by any unauthenticated attacker who can reach the PCF's SBI interface, making the vulnerability highly actionable. When an attacker repeatedly sends requests, the PCF can be pushed into a DoS state quickly, because the attack does not require privileged access and relies on a simple HTTP interface.

Generated by OpenCVE AI on April 22, 2026 at 06:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PCF component to version 1.4.3 or later, which removes the repetitive middleware registration and restores normal memory usage.
  • Restart the PCF service after the upgrade to ensure the new code is active.
  • If an upgrade cannot be performed immediately, limit traffic to the OAM endpoint by applying rate‑limiting or firewall rules to reduce the request rate from external sources.

Generated by OpenCVE AI on April 22, 2026 at 06:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc pcf
Vendors & Products Free5gc
Free5gc pcf

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description free5GC UDR is the Policy Control Function (PCF) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. A memory leak vulnerability in versions prior to 1.4.3 allows any unauthenticated attacker with network access to the PCF SBI interface to cause uncontrolled memory growth by sending repeated HTTP requests to the OAM endpoint. The root cause is a `router.Use()` call inside an HTTP handler that registers a new CORS middleware on every incoming request, permanently growing the Gin router's handler chain. This leads to progressive memory exhaustion and eventual Denial of Service of the PCF, preventing all UEs from obtaining AM and SM policies and blocking 5G session establishment. Version 1.4.3 contains a patch.
Title free5GC PCF: Memory Leak via CORS Middleware Registration in HTTP Handler Leads to Denial of Service
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T23:49:19.659Z

Reserved: 2026-04-17T12:59:15.738Z

Link: CVE-2026-41135

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T00:16:29.287

Modified: 2026-04-22T00:16:29.287

Link: CVE-2026-41135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T06:15:10Z

Weaknesses