Description
A vulnerability was identified in Free5GC 4.2.0. This affects an unknown function of the component NGSetupRequest Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit is publicly available and might be used.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch/Update
AI Analysis

Impact

A flaw exists in the NGSetupRequest handler in Free5GC version 4.2.0 that allows an attacker to manipulate the request so that the component crashes or becomes unresponsive, resulting in a denial of service. This disrupts critical 5G core network functions and can affect carrier operations. The issue stems from a logical error that was identified as CWE-404.

Affected Systems

Free5GC is an open‑source 5G core network implementation. The vulnerability specifically affects version 4.2.0 and any builds derived from that code base. No other product versions or vendors are listed as impacted.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity. Exploitation is possible remotely and the exploit code is publicly available, according to the description. No EPSS score is reported, and the vulnerability is not yet in the CISA KEV catalog, but the potential for widespread denial of service remains a concern for operators relying on the affected Free5GC release.

Generated by OpenCVE AI on April 6, 2026 at 17:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Free5GC patch that fixes NGSetupRequest handling (check the project’s release notes for the specific commit or version).
  • If a patch is not yet available, upgrade to a newer Free5GC release that incorporates the fix or rebuild from the updated source.
  • While waiting for a patch, block or restrict external traffic to the NGSetupRequest endpoint using firewall or ACL rules.
  • Continuously monitor system logs for repeated NGSetupRequest failures or crash indicators, and alert on abnormal patterns.
  • If a fix remains unavailable, consider disabling the NGSetupRequest related functionality or migrating to an alternative 5G core implementation.

Generated by OpenCVE AI on April 6, 2026 at 17:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Free5GC 4.2.0. This affects an unknown function of the component NGSetupRequest Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit is publicly available and might be used.
Title Free5GC NGSetupRequest denial of service
First Time appeared Free5gc
Free5gc free5gc
Weaknesses CWE-404
CPEs cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*
Vendors & Products Free5gc
Free5gc free5gc
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:55:09.634Z

Reserved: 2026-04-06T07:48:14.498Z

Link: CVE-2026-5661

cve-icon Vulnrichment

Updated: 2026-04-06T14:54:19.016Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T15:17:15.960

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5661

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:32:46Z

Weaknesses