Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66719: n/a

0
High
VulnerabilityCVE-2025-66719cvecve-2025-66719
Published: Fri Jan 23 2026 (01/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-66719 is a vulnerability in Free5gc NRF 1. 4. 0 where the AccessTokenScopeCheck() function improperly bypasses scope validation when a crafted targetNF value is used. This flaw allows attackers to obtain access tokens with arbitrary scopes, potentially granting unauthorized access to network functions. The vulnerability affects the core network function repository component in 5G core networks, which is critical for managing service access and authorization. Exploitation does not require user interaction but does require the ability to send crafted requests to the NRF. No known exploits are currently in the wild, and no patches have been published yet. European telecom operators deploying Free5gc or derivatives could face significant risks, including unauthorized network access and potential service disruption. Mitigation involves strict input validation, monitoring for anomalous access token requests, and applying vendor patches once available. Countries with advanced 5G infrastructure and Free5gc adoption, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/23/2026, 16:06:15 UTC

Technical Analysis

The vulnerability identified as CVE-2025-66719 affects Free5gc NRF version 1.4.0, specifically within the access-token generation logic. The function AccessTokenScopeCheck(), located in internal/sbi/processor/access_token.go, is responsible for validating the scope of access tokens issued to network functions. However, due to improper validation logic, when an attacker crafts a specific targetNF value, the function bypasses all scope checks. This means that an attacker can request and obtain access tokens with arbitrary scopes, effectively granting them unauthorized permissions within the 5G core network. The NRF (Network Repository Function) is a pivotal component in the 5G core architecture, managing the registration and discovery of network functions and enforcing access control policies. By exploiting this flaw, an attacker could impersonate or escalate privileges across network functions, potentially leading to unauthorized data access, manipulation of network services, or disruption of 5G network operations. The vulnerability does not require user interaction but does require the attacker to send crafted requests to the NRF interface, which may be exposed internally or externally depending on network configuration. No CVSS score has been assigned yet, and no public patches or exploits are currently known. This vulnerability highlights a critical weakness in access control enforcement within a fundamental 5G core component.

Potential Impact

For European organizations, particularly telecom operators and service providers deploying Free5gc or its derivatives, this vulnerability poses a significant risk. Unauthorized access tokens with arbitrary scopes can allow attackers to bypass security controls, access sensitive subscriber data, manipulate network functions, or disrupt service availability. This could lead to breaches of confidentiality, integrity, and availability of 5G network services. Given the increasing reliance on 5G for critical infrastructure, industrial IoT, and public safety communications in Europe, exploitation could have cascading effects beyond telecom networks, impacting other sectors dependent on 5G connectivity. The absence of known exploits currently provides a window for proactive mitigation, but the critical nature of the NRF function means that any successful exploit could have widespread and severe consequences.

Mitigation Recommendations

1. Implement strict input validation on the targetNF parameter within the access-token generation logic to prevent crafted values from bypassing scope checks. 2. Conduct thorough code audits and security reviews of the access token generation and validation processes in Free5gc NRF implementations. 3. Monitor NRF logs and network traffic for anomalous or unexpected access token requests, especially those with unusual targetNF values or scopes. 4. Restrict access to the NRF interface to trusted internal networks and enforce strong authentication and authorization controls. 5. Engage with Free5gc maintainers or vendors for timely patches or updates addressing this vulnerability. 6. Deploy network segmentation and zero-trust principles to limit the impact of potential token misuse. 7. Prepare incident response plans specific to 5G core network compromises, including token misuse scenarios. 8. Consider deploying additional runtime application self-protection (RASP) or Web Application Firewall (WAF) solutions tailored to 5G core network components to detect and block exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697398e14623b1157c4c5d29

Added to database: 1/23/2026, 3:50:57 PM

Last enriched: 1/23/2026, 4:06:15 PM

Last updated: 1/23/2026, 6:15:31 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats