CVE-2025-65562: n/a
CVE-2025-65562 is a vulnerability in the free5GC User Plane Function (UPF) where improper bounds checking on the SEID field in PFCP Session Deletion Requests allows an unauthenticated remote attacker to cause a denial of service. By sending a specially crafted request with an excessively large SEID value, the system experiences an integer conversion underflow leading to a negative index access and a Go runtime panic, crashing the UPF. This flaw affects free5GC version 4. 1. 0 and potentially other versions. No authentication or user interaction is required to exploit this vulnerability, making it remotely exploitable. The impact is a denial of service on critical 5G core network components, potentially disrupting mobile network services. European telecom operators using free5GC or derivatives are at risk, especially in countries with advanced 5G deployments. Mitigation requires patching the software to add proper bounds checking and input validation on SEID values. Until patches are available, network-level filtering and anomaly detection on PFCP traffic can reduce risk.
AI Analysis
Technical Summary
CVE-2025-65562 identifies a critical vulnerability in the free5GC User Plane Function (UPF), a core component of the 5G core network responsible for packet forwarding and session management. The vulnerability arises from a lack of bounds checking on the SEID (Session Endpoint Identifier) field when processing PFCP (Packet Forwarding Control Protocol) Session Deletion Requests. Specifically, an attacker can send a PFCP Session Deletion Request with a very large SEID value (e.g., 0xFFFFFFFFFFFFFFFF), which is a uint64 integer. During processing in the Go-based implementation, this large unsigned integer is converted to a signed int type and used as an index in session lookup/deletion operations within LocalNode.DeleteSess() and LocalNode.Sess() functions. This conversion causes an integer underflow, resulting in a negative index used to access the session map (n.sess). Accessing a negative index triggers a Go runtime panic, crashing the UPF process and causing a denial of service. The vulnerability requires no authentication or user interaction, making it remotely exploitable by any attacker able to send PFCP messages to the UPF. The issue has been confirmed on free5GC version 4.1.0, with the potential for other versions to be affected due to similar code paths. The UPF is a critical network function in 5G infrastructure, and its crash disrupts user data plane traffic, impacting service availability. No known exploits in the wild have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant threat. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability factors.
Potential Impact
The primary impact of CVE-2025-65562 is a denial of service condition on the free5GC UPF, a vital component in 5G networks responsible for forwarding user data traffic. For European organizations, particularly telecom operators and mobile network providers deploying free5GC or its derivatives, this vulnerability can lead to service outages affecting end-users' mobile connectivity and data services. Disruptions in UPF availability can degrade network performance, cause dropped sessions, and interrupt critical communications, potentially impacting emergency services, enterprise customers, and consumer mobile users. The vulnerability's unauthenticated remote exploitability increases the attack surface, enabling attackers to disrupt services without prior access. Given Europe's rapid 5G adoption and reliance on open-source 5G core implementations to reduce costs and increase flexibility, the risk is heightened. Additionally, the potential cascading effects on dependent network functions and services could amplify operational impacts. Regulatory compliance and service level agreements may also be affected due to service interruptions. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's disclosure timeline suggests a need for urgent attention.
Mitigation Recommendations
To mitigate CVE-2025-65562, organizations should prioritize updating free5GC UPF components to patched versions once available that include proper bounds checking and input validation on the SEID field in PFCP messages. In the absence of immediate patches, network operators should implement strict filtering and validation of PFCP traffic at the network edge or firewall to block malformed or suspicious Session Deletion Requests with anomalous SEID values. Deploying anomaly detection systems that monitor PFCP protocol behavior can help identify and alert on potential exploitation attempts. Segmentation of the 5G core network and limiting exposure of UPF interfaces to untrusted networks reduces attack surface. Additionally, operators should review and harden Go runtime configurations to improve resilience against panics and crashes. Regular security audits and code reviews of open-source 5G core components are recommended to identify similar issues proactively. Coordination with free5GC maintainers and participation in community security discussions can facilitate timely patching and information sharing. Finally, maintaining robust incident response plans for 5G network disruptions will help minimize operational impact.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-65562: n/a
Description
CVE-2025-65562 is a vulnerability in the free5GC User Plane Function (UPF) where improper bounds checking on the SEID field in PFCP Session Deletion Requests allows an unauthenticated remote attacker to cause a denial of service. By sending a specially crafted request with an excessively large SEID value, the system experiences an integer conversion underflow leading to a negative index access and a Go runtime panic, crashing the UPF. This flaw affects free5GC version 4. 1. 0 and potentially other versions. No authentication or user interaction is required to exploit this vulnerability, making it remotely exploitable. The impact is a denial of service on critical 5G core network components, potentially disrupting mobile network services. European telecom operators using free5GC or derivatives are at risk, especially in countries with advanced 5G deployments. Mitigation requires patching the software to add proper bounds checking and input validation on SEID values. Until patches are available, network-level filtering and anomaly detection on PFCP traffic can reduce risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-65562 identifies a critical vulnerability in the free5GC User Plane Function (UPF), a core component of the 5G core network responsible for packet forwarding and session management. The vulnerability arises from a lack of bounds checking on the SEID (Session Endpoint Identifier) field when processing PFCP (Packet Forwarding Control Protocol) Session Deletion Requests. Specifically, an attacker can send a PFCP Session Deletion Request with a very large SEID value (e.g., 0xFFFFFFFFFFFFFFFF), which is a uint64 integer. During processing in the Go-based implementation, this large unsigned integer is converted to a signed int type and used as an index in session lookup/deletion operations within LocalNode.DeleteSess() and LocalNode.Sess() functions. This conversion causes an integer underflow, resulting in a negative index used to access the session map (n.sess). Accessing a negative index triggers a Go runtime panic, crashing the UPF process and causing a denial of service. The vulnerability requires no authentication or user interaction, making it remotely exploitable by any attacker able to send PFCP messages to the UPF. The issue has been confirmed on free5GC version 4.1.0, with the potential for other versions to be affected due to similar code paths. The UPF is a critical network function in 5G infrastructure, and its crash disrupts user data plane traffic, impacting service availability. No known exploits in the wild have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant threat. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability factors.
Potential Impact
The primary impact of CVE-2025-65562 is a denial of service condition on the free5GC UPF, a vital component in 5G networks responsible for forwarding user data traffic. For European organizations, particularly telecom operators and mobile network providers deploying free5GC or its derivatives, this vulnerability can lead to service outages affecting end-users' mobile connectivity and data services. Disruptions in UPF availability can degrade network performance, cause dropped sessions, and interrupt critical communications, potentially impacting emergency services, enterprise customers, and consumer mobile users. The vulnerability's unauthenticated remote exploitability increases the attack surface, enabling attackers to disrupt services without prior access. Given Europe's rapid 5G adoption and reliance on open-source 5G core implementations to reduce costs and increase flexibility, the risk is heightened. Additionally, the potential cascading effects on dependent network functions and services could amplify operational impacts. Regulatory compliance and service level agreements may also be affected due to service interruptions. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's disclosure timeline suggests a need for urgent attention.
Mitigation Recommendations
To mitigate CVE-2025-65562, organizations should prioritize updating free5GC UPF components to patched versions once available that include proper bounds checking and input validation on the SEID field in PFCP messages. In the absence of immediate patches, network operators should implement strict filtering and validation of PFCP traffic at the network edge or firewall to block malformed or suspicious Session Deletion Requests with anomalous SEID values. Deploying anomaly detection systems that monitor PFCP protocol behavior can help identify and alert on potential exploitation attempts. Segmentation of the 5G core network and limiting exposure of UPF interfaces to untrusted networks reduces attack surface. Additionally, operators should review and harden Go runtime configurations to improve resilience against panics and crashes. Regular security audits and code reviews of open-source 5G core components are recommended to identify similar issues proactively. Coordination with free5GC maintainers and participation in community security discussions can facilitate timely patching and information sharing. Finally, maintaining robust incident response plans for 5G network disruptions will help minimize operational impact.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694451e44eb3efac36a23a53
Added to database: 12/18/2025, 7:11:32 PM
Last enriched: 12/18/2025, 7:27:21 PM
Last updated: 12/18/2025, 9:00:57 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67653: CWE-22 in Advantech WebAccess/SCADA
MediumCVE-2025-62004: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in BullWall Server Intrusion Protection
HighCVE-2025-62003: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in BullWall Server Intrusion Protection
MediumCVE-2025-46268: CWE-89 in Advantech WebAccess/SCADA
MediumCVE-2025-63948: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.