Description
free5GC AMF provides Access & Mobility Management Function (AMF) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. Prior to version 1.4.3, the `HTTPUEContextTransfer` handler in `internal/sbi/api_communication.go` does not include a `default` case in the `Content-Type` switch statement. When a request arrives with an unsupported `Content-Type`, the deserialization step is silently skipped, `err` remains `nil`, and the processor is invoked with a completely uninitialized `UeContextTransferRequest` object. Version 1.4.3 contains a fix.
Published: 2026-04-21
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The AMF’s HTTPUEContextTransfer handler performs a Content-Type switch without a default clause. When a request carries an unsupported Content-Type, the deserialization step is silently skipped, leaving err nil and the UeContextTransferRequest object uninitialized. The processor is then invoked with this uninitialized request, which can cause the AMF to misbehave, potentially crash or otherwise expose unpredictable state. This flaw represents the misuse of an uninitialized variable (CWE‑440).

Affected Systems

All free5gc AMF deployments using a release prior to v1.4.3 are impacted. The vulnerability exists in the open‑source Free5GC project’s AMF component. Anyone running AMF 1.4.2 or earlier should consider this affected. The fix is shipped in release v1.4.3.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity and the issue is listed as not in KEV, with no EPSS data available. The likely attack vector is remote: an attacker can send an HTTPUEContextTransfer request with an unsupported Content-Type to the AMF. Because the handler silently ignores the bad type and processes an uninitialized request, it can trigger a denial of service or other abnormal behavior. While no proof of exploitation is documented, the moderate CVSS score and lack of a defensive default case suggest a non‑zero risk of exploitation in a suitable environment.

Generated by OpenCVE AI on April 22, 2026 at 04:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade free5gc AMF to version 1.4.3 or later
  • If an upgrade cannot be performed immediately, block or reject incoming HTTPUEContextTransfer requests that contain unsupported Content-Type values at the network or application layer
  • Modify the AMF codebase to include a default case in the Content-Type switch that returns a clear error for unsupported media types, thereby preventing the processor from executing with an uninitialized request

Generated by OpenCVE AI on April 22, 2026 at 04:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc amf
Vendors & Products Free5gc
Free5gc amf

Wed, 22 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description free5GC AMF provides Access & Mobility Management Function (AMF) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. Prior to version 1.4.3, the `HTTPUEContextTransfer` handler in `internal/sbi/api_communication.go` does not include a `default` case in the `Content-Type` switch statement. When a request arrives with an unsupported `Content-Type`, the deserialization step is silently skipped, `err` remains `nil`, and the processor is invoked with a completely uninitialized `UeContextTransferRequest` object. Version 1.4.3 contains a fix.
Title free5GC AMF missing default case in Content-Type switch in HTTPUEContextTransfer
Weaknesses CWE-440
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T23:54:36.727Z

Reserved: 2026-04-17T12:59:15.738Z

Link: CVE-2026-41136

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T00:16:29.423

Modified: 2026-04-22T00:16:29.423

Link: CVE-2026-41136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:30:05Z

Weaknesses