CVE-2025-60632: n/a
An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attacker to cause a denial of service via crafted POST request to the Npcf_BDTPolicyControl API.
AI Analysis
Technical Summary
CVE-2025-60632 is a denial of service vulnerability identified in Free5GC versions 4.0.0 and 4.0.1, specifically targeting the Npcf_BDTPolicyControl API. Free5GC is an open-source 5G core network implementation widely used for research, development, and some production environments. The vulnerability arises from improper handling of crafted POST requests to this API endpoint, which can cause the service to crash or become unresponsive, leading to denial of service. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion failure or similar logic flaw is triggered by malicious input. The CVSS v3.1 score of 6.5 reflects a medium severity level, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. This vulnerability poses a risk to 5G core network stability, potentially disrupting subscriber services and network operations. Given the critical role of the Npcf_BDTPolicyControl API in managing policy control functions, exploitation could degrade network performance or cause outages. The lack of authentication requirements lowers the barrier for attackers to attempt exploitation, although user interaction (sending crafted requests) is necessary. This vulnerability underscores the importance of robust input validation and API security in 5G core components.
Potential Impact
For European organizations, particularly telecommunications providers and network operators deploying Free5GC in their 5G core infrastructure, this vulnerability could lead to denial of service conditions affecting network availability. Service disruptions in 5G core functions can impact subscriber connectivity, degrade quality of service, and potentially cause cascading failures in dependent network services. This could result in customer dissatisfaction, regulatory scrutiny, and financial losses. Critical infrastructure relying on 5G for IoT, emergency services, and industrial applications may face operational risks. The medium severity indicates that while the vulnerability is not catastrophic, it still poses a tangible threat to network reliability. Since no known exploits exist yet, proactive mitigation is essential to prevent attackers from developing and deploying exploits. The impact is primarily on availability, with no direct compromise of data confidentiality or integrity, but availability issues in telecommunications can have widespread consequences.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Deploy network-level filtering and intrusion detection systems to monitor and block anomalous POST requests targeting the Npcf_BDTPolicyControl API. 2) Enforce strict input validation and sanitization on all API endpoints to prevent malformed requests from triggering service failures. 3) Isolate the vulnerable Free5GC components within segmented network zones to limit the blast radius of potential DoS attacks. 4) Implement rate limiting on API requests to reduce the risk of resource exhaustion from crafted requests. 5) Maintain up-to-date monitoring and logging to detect early signs of exploitation attempts. 6) Engage with Free5GC community and vendors for timely patches and updates once available. 7) Conduct regular security assessments and penetration testing focused on 5G core network components. 8) Prepare incident response plans specifically addressing 5G core service disruptions. These measures go beyond generic advice by focusing on the unique aspects of 5G core network security and the specific API involved.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden
CVE-2025-60632: n/a
Description
An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attacker to cause a denial of service via crafted POST request to the Npcf_BDTPolicyControl API.
AI-Powered Analysis
Technical Analysis
CVE-2025-60632 is a denial of service vulnerability identified in Free5GC versions 4.0.0 and 4.0.1, specifically targeting the Npcf_BDTPolicyControl API. Free5GC is an open-source 5G core network implementation widely used for research, development, and some production environments. The vulnerability arises from improper handling of crafted POST requests to this API endpoint, which can cause the service to crash or become unresponsive, leading to denial of service. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion failure or similar logic flaw is triggered by malicious input. The CVSS v3.1 score of 6.5 reflects a medium severity level, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. This vulnerability poses a risk to 5G core network stability, potentially disrupting subscriber services and network operations. Given the critical role of the Npcf_BDTPolicyControl API in managing policy control functions, exploitation could degrade network performance or cause outages. The lack of authentication requirements lowers the barrier for attackers to attempt exploitation, although user interaction (sending crafted requests) is necessary. This vulnerability underscores the importance of robust input validation and API security in 5G core components.
Potential Impact
For European organizations, particularly telecommunications providers and network operators deploying Free5GC in their 5G core infrastructure, this vulnerability could lead to denial of service conditions affecting network availability. Service disruptions in 5G core functions can impact subscriber connectivity, degrade quality of service, and potentially cause cascading failures in dependent network services. This could result in customer dissatisfaction, regulatory scrutiny, and financial losses. Critical infrastructure relying on 5G for IoT, emergency services, and industrial applications may face operational risks. The medium severity indicates that while the vulnerability is not catastrophic, it still poses a tangible threat to network reliability. Since no known exploits exist yet, proactive mitigation is essential to prevent attackers from developing and deploying exploits. The impact is primarily on availability, with no direct compromise of data confidentiality or integrity, but availability issues in telecommunications can have widespread consequences.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Deploy network-level filtering and intrusion detection systems to monitor and block anomalous POST requests targeting the Npcf_BDTPolicyControl API. 2) Enforce strict input validation and sanitization on all API endpoints to prevent malformed requests from triggering service failures. 3) Isolate the vulnerable Free5GC components within segmented network zones to limit the blast radius of potential DoS attacks. 4) Implement rate limiting on API requests to reduce the risk of resource exhaustion from crafted requests. 5) Maintain up-to-date monitoring and logging to detect early signs of exploitation attempts. 6) Engage with Free5GC community and vendors for timely patches and updates once available. 7) Conduct regular security assessments and penetration testing focused on 5G core network components. 8) Prepare incident response plans specifically addressing 5G core service disruptions. These measures go beyond generic advice by focusing on the unique aspects of 5G core network security and the specific API involved.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69248078d5a1e53350b07798
Added to database: 11/24/2025, 3:57:44 PM
Last enriched: 12/1/2025, 4:45:27 PM
Last updated: 1/8/2026, 10:32:08 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumCVE-2025-15464: CWE-926 Improper Export of Android Application Components in yintibao Fun Print Mobile
HighCVE-2025-14505: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Elliptic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.