Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69232: CWE-20: Improper Input Validation in free5gc go-upf

0
Low
VulnerabilityCVE-2025-69232cvecve-2025-69232cwe-20
Published: Mon Feb 23 2026 (02/23/2026, 21:27:51 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: go-upf

Description

free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.

AI-Powered Analysis

AILast updated: 02/23/2026, 22:02:21 UTC

Technical Analysis

CVE-2025-69232 identifies an improper input validation vulnerability (CWE-20) in the go-upf component of free5GC, an open-source 5G core network implementation. The vulnerability exists in versions up to and including 1.2.6 of go-upf and SMF versions up to 1.4.0. The issue arises when the User Plane Function (UPF) improperly processes malformed PFCP (Packet Forwarding Control Protocol) Association Setup Requests from remote attackers. Instead of rejecting malformed requests, the UPF accepts them, which causes it to enter an inconsistent internal state. This inconsistent state triggers subsequent legitimate requests to cause the Session Management Function (SMF) to repeatedly attempt reconnections, creating loops that degrade service availability. The vulnerability requires no privileges, authentication, or user interaction, making it remotely exploitable over the network. While the CVSS 4.0 base score is 2.7 (low severity), reflecting limited direct impact on confidentiality, integrity, or availability, the practical effect on 5G core network stability and service continuity can be substantial. No known exploits are currently in the wild, and a patch is in development but not yet released. No application-level workarounds exist, so affected deployments must monitor for official updates and plan timely patching to restore protocol compliance and input validation robustness.

Potential Impact

The primary impact of this vulnerability is denial of service (DoS) within the 5G core network infrastructure, specifically affecting the UPF and SMF components of free5GC deployments. Disruption of these core network functions can degrade or interrupt mobile network services, affecting voice, data, and signaling traffic for subscribers. This can lead to service outages, reduced network reliability, and potential loss of revenue and customer trust for mobile network operators using free5GC. Because 5G networks are critical infrastructure supporting not only consumer communications but also industrial, emergency, and governmental applications, the impact extends beyond typical telecom service degradation. The vulnerability's ease of exploitation without authentication increases risk, especially in environments where network access is not tightly controlled. However, the low CVSS score indicates limited impact on confidentiality or integrity, and the vulnerability does not allow remote code execution or data compromise. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks once the vulnerability becomes widely known.

Mitigation Recommendations

Organizations using free5GC with affected go-upf (<=1.2.6) and SMF (<=1.4.0) components should prepare to apply the official patch as soon as it is released by the free5GC project. Until then, network administrators should implement strict network segmentation and access controls to limit exposure of the UPF and SMF interfaces to untrusted networks. Monitoring and anomaly detection should be enhanced to identify unusual PFCP traffic patterns or repeated reconnection attempts indicative of exploitation attempts. Deploying upstream filtering or protocol validation proxies that can detect and block malformed PFCP Association Setup Requests may provide temporary mitigation. Additionally, operators should review and harden their 5G core network configurations to minimize attack surface and ensure logging is enabled for forensic analysis. Coordination with vendors and participation in relevant security communities will help ensure timely awareness of patch availability and exploitation trends.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T20:54:04.664Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699ccae3be58cf853bccd9ee

Added to database: 2/23/2026, 9:47:15 PM

Last enriched: 2/23/2026, 10:02:21 PM

Last updated: 2/24/2026, 6:12:13 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats