CVE-2025-65562: n/a
The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests. An unauthenticated remote attacker can send a request with a very large SEID (e.g., 0xFFFFFFFFFFFFFFFF) that causes an integer conversion/underflow in LocalNode.DeleteSess() / LocalNode.Sess() when a uint64 SEID is converted to int and used in index arithmetic. This leads to a negative index into n.sess and a Go runtime panic, resulting in a denial of service (UPF crash). The issue has been reproduced on free5GC v4.1.0 with crashes observed in the session lookup/deletion path in internal/pfcp/node.go; other versions may also be affected. No authentication is required.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-65562 affects the free5GC User Plane Function (UPF), a critical component in 5G core networks responsible for handling user data traffic. The flaw arises from a lack of bounds checking on the SEID (Session Endpoint Identifier) when processing PFCP (Packet Forwarding Control Protocol) Session Deletion Requests. Specifically, an attacker can send a PFCP message with an abnormally large SEID value (e.g., 0xFFFFFFFFFFFFFFFF). This value, when converted from an unsigned 64-bit integer (uint64) to a signed integer (int) in the Go programming language, causes an integer underflow. The underflow results in a negative index used to access the session array (n.sess) in the functions LocalNode.DeleteSess() and LocalNode.Sess(). Accessing a negative index triggers a Go runtime panic, crashing the UPF process and causing a denial of service (DoS). The vulnerability requires no authentication or user interaction, making it remotely exploitable by any attacker able to send PFCP messages to the UPF. The issue was confirmed on free5GC version 4.1.0, with potential impact on other versions due to similar code structure. The vulnerability is categorized under CWE-129 (Improper Validation of Array Index). Although no public exploits are currently known, the CVSS v3.1 base score is 7.5, reflecting high severity due to ease of exploitation and impact on availability. This DoS can disrupt 5G data plane operations, affecting user connectivity and service continuity. The lack of authentication requirement and direct impact on a core network function make this a significant threat vector for 5G deployments using free5GC.
Potential Impact
For European organizations, particularly telecom operators and 5G service providers deploying free5GC as part of their 5G core network infrastructure, this vulnerability poses a substantial risk to network availability. A successful attack can crash the UPF, interrupting user data traffic and causing service outages that degrade customer experience and potentially violate service level agreements. Given the critical role of UPF in routing and forwarding user plane data, prolonged or repeated crashes could lead to widespread network instability. This may also impact enterprise customers relying on 5G connectivity for critical applications, including IoT, industrial automation, and emergency services. The disruption could have cascading effects on dependent services and increase operational costs due to incident response and recovery efforts. Additionally, the unauthenticated nature of the exploit increases the attack surface, as attackers do not need privileged access or user credentials. While no known exploits are currently in the wild, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential attacks. European regulators and network operators focused on 5G security should prioritize addressing this vulnerability to maintain network resilience and trust.
Mitigation Recommendations
1. Monitor free5GC project repositories and security advisories closely for official patches addressing CVE-2025-65562 and apply them promptly once available. 2. Implement strict input validation on PFCP messages at the network edge or within the UPF to detect and reject anomalous SEID values before processing. 3. Employ runtime protections such as Go language panic recovery mechanisms and process supervision to automatically restart the UPF service upon crashes, minimizing downtime. 4. Restrict network access to PFCP interfaces using firewall rules and network segmentation to limit exposure to untrusted sources. 5. Deploy anomaly detection systems to monitor PFCP traffic patterns and alert on suspicious session deletion requests with abnormal SEID values. 6. Conduct regular security testing and fuzzing of PFCP message handling to identify similar vulnerabilities proactively. 7. Consider deploying redundant UPF instances with load balancing to ensure service continuity in case of individual component failure. 8. Collaborate with vendors and open-source communities to contribute patches and share threat intelligence related to this vulnerability. These targeted measures go beyond generic advice by focusing on protocol-specific validation, runtime resilience, and network-level protections tailored to free5GC UPF environments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2025-65562: n/a
Description
The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests. An unauthenticated remote attacker can send a request with a very large SEID (e.g., 0xFFFFFFFFFFFFFFFF) that causes an integer conversion/underflow in LocalNode.DeleteSess() / LocalNode.Sess() when a uint64 SEID is converted to int and used in index arithmetic. This leads to a negative index into n.sess and a Go runtime panic, resulting in a denial of service (UPF crash). The issue has been reproduced on free5GC v4.1.0 with crashes observed in the session lookup/deletion path in internal/pfcp/node.go; other versions may also be affected. No authentication is required.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-65562 affects the free5GC User Plane Function (UPF), a critical component in 5G core networks responsible for handling user data traffic. The flaw arises from a lack of bounds checking on the SEID (Session Endpoint Identifier) when processing PFCP (Packet Forwarding Control Protocol) Session Deletion Requests. Specifically, an attacker can send a PFCP message with an abnormally large SEID value (e.g., 0xFFFFFFFFFFFFFFFF). This value, when converted from an unsigned 64-bit integer (uint64) to a signed integer (int) in the Go programming language, causes an integer underflow. The underflow results in a negative index used to access the session array (n.sess) in the functions LocalNode.DeleteSess() and LocalNode.Sess(). Accessing a negative index triggers a Go runtime panic, crashing the UPF process and causing a denial of service (DoS). The vulnerability requires no authentication or user interaction, making it remotely exploitable by any attacker able to send PFCP messages to the UPF. The issue was confirmed on free5GC version 4.1.0, with potential impact on other versions due to similar code structure. The vulnerability is categorized under CWE-129 (Improper Validation of Array Index). Although no public exploits are currently known, the CVSS v3.1 base score is 7.5, reflecting high severity due to ease of exploitation and impact on availability. This DoS can disrupt 5G data plane operations, affecting user connectivity and service continuity. The lack of authentication requirement and direct impact on a core network function make this a significant threat vector for 5G deployments using free5GC.
Potential Impact
For European organizations, particularly telecom operators and 5G service providers deploying free5GC as part of their 5G core network infrastructure, this vulnerability poses a substantial risk to network availability. A successful attack can crash the UPF, interrupting user data traffic and causing service outages that degrade customer experience and potentially violate service level agreements. Given the critical role of UPF in routing and forwarding user plane data, prolonged or repeated crashes could lead to widespread network instability. This may also impact enterprise customers relying on 5G connectivity for critical applications, including IoT, industrial automation, and emergency services. The disruption could have cascading effects on dependent services and increase operational costs due to incident response and recovery efforts. Additionally, the unauthenticated nature of the exploit increases the attack surface, as attackers do not need privileged access or user credentials. While no known exploits are currently in the wild, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential attacks. European regulators and network operators focused on 5G security should prioritize addressing this vulnerability to maintain network resilience and trust.
Mitigation Recommendations
1. Monitor free5GC project repositories and security advisories closely for official patches addressing CVE-2025-65562 and apply them promptly once available. 2. Implement strict input validation on PFCP messages at the network edge or within the UPF to detect and reject anomalous SEID values before processing. 3. Employ runtime protections such as Go language panic recovery mechanisms and process supervision to automatically restart the UPF service upon crashes, minimizing downtime. 4. Restrict network access to PFCP interfaces using firewall rules and network segmentation to limit exposure to untrusted sources. 5. Deploy anomaly detection systems to monitor PFCP traffic patterns and alert on suspicious session deletion requests with abnormal SEID values. 6. Conduct regular security testing and fuzzing of PFCP message handling to identify similar vulnerabilities proactively. 7. Consider deploying redundant UPF instances with load balancing to ensure service continuity in case of individual component failure. 8. Collaborate with vendors and open-source communities to contribute patches and share threat intelligence related to this vulnerability. These targeted measures go beyond generic advice by focusing on protocol-specific validation, runtime resilience, and network-level protections tailored to free5GC UPF environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694451e44eb3efac36a23a53
Added to database: 12/18/2025, 7:11:32 PM
Last enriched: 12/25/2025, 7:56:18 PM
Last updated: 2/4/2026, 7:22:04 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24447: Improper neutralization of formula elements in a CSV file in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-23704: Unrestricted upload of file with dangerous type in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-22875: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-21393: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.