CVE-2025-69232: CWE-20: Improper Input Validation in free5gc go-upf
free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.
AI Analysis
Technical Summary
free5GC is an open-source 5G core network implementation, with the go-upf component responsible for the User Plane Function (UPF). Versions of go-upf up to 1.2.6, and corresponding SMF versions up to 1.4.0, contain a vulnerability classified as CWE-20 (Improper Input Validation). Specifically, the UPF improperly processes a malformed PFCP (Packet Forwarding Control Protocol) Association Setup Request sent by a remote attacker. Instead of rejecting the malformed request, the UPF accepts it and transitions into an inconsistent internal state. This corrupted state causes legitimate subsequent PFCP requests to trigger reconnection loops in the SMF (Session Management Function), degrading service availability and causing denial of service in the 5G core network. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. As of the publication date, no patch is available, and no direct application-level mitigations exist. The issue impacts all deployments using the affected free5GC UPF and SMF versions, potentially disrupting 5G core network operations until fixed.
Potential Impact
The primary impact of this vulnerability is denial of service within the 5G core network, specifically affecting the UPF and SMF components. Disruption of these critical network functions can lead to degraded or unavailable mobile data services for subscribers, impacting telecommunications providers and their customers. This can cause service outages, loss of connectivity, and degraded user experience. For organizations relying on free5GC for private or public 5G networks, this could interrupt business-critical communications and IoT operations. Although the CVSS score is low, the strategic importance of 5G core network availability means even short disruptions can have significant operational and reputational consequences. The vulnerability does not appear to allow data leakage or privilege escalation, limiting confidentiality and integrity impacts, but availability is clearly affected. The lack of authentication requirements and remote exploitability increase the risk of opportunistic attacks, especially in environments where free5GC is exposed to untrusted networks.
Mitigation Recommendations
Since no patch is currently available, organizations should implement network-level protections to limit exposure of the free5GC UPF and SMF components to untrusted or public networks. Deploy strict firewall rules and access controls to restrict PFCP traffic to trusted management and control plane hosts only. Monitor network traffic for malformed PFCP Association Setup Requests and anomalous PFCP behavior indicative of exploitation attempts. Employ network segmentation to isolate the 5G core network components from other infrastructure. Prepare for rapid deployment of the official patch once released by free5GC maintainers. Additionally, consider deploying redundancy and failover mechanisms for UPF and SMF components to minimize service disruption if an attack occurs. Engage with free5GC community and vendors for updates and best practices. Avoid exposing free5GC control plane interfaces directly to the internet or untrusted environments until patched.
Affected Countries
United States, China, South Korea, Japan, Germany, United Kingdom, France, India, Brazil, Australia, Canada, Italy, Spain, Netherlands
CVE-2025-69232: CWE-20: Improper Input Validation in free5gc go-upf
Description
free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
free5GC is an open-source 5G core network implementation, with the go-upf component responsible for the User Plane Function (UPF). Versions of go-upf up to 1.2.6, and corresponding SMF versions up to 1.4.0, contain a vulnerability classified as CWE-20 (Improper Input Validation). Specifically, the UPF improperly processes a malformed PFCP (Packet Forwarding Control Protocol) Association Setup Request sent by a remote attacker. Instead of rejecting the malformed request, the UPF accepts it and transitions into an inconsistent internal state. This corrupted state causes legitimate subsequent PFCP requests to trigger reconnection loops in the SMF (Session Management Function), degrading service availability and causing denial of service in the 5G core network. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. As of the publication date, no patch is available, and no direct application-level mitigations exist. The issue impacts all deployments using the affected free5GC UPF and SMF versions, potentially disrupting 5G core network operations until fixed.
Potential Impact
The primary impact of this vulnerability is denial of service within the 5G core network, specifically affecting the UPF and SMF components. Disruption of these critical network functions can lead to degraded or unavailable mobile data services for subscribers, impacting telecommunications providers and their customers. This can cause service outages, loss of connectivity, and degraded user experience. For organizations relying on free5GC for private or public 5G networks, this could interrupt business-critical communications and IoT operations. Although the CVSS score is low, the strategic importance of 5G core network availability means even short disruptions can have significant operational and reputational consequences. The vulnerability does not appear to allow data leakage or privilege escalation, limiting confidentiality and integrity impacts, but availability is clearly affected. The lack of authentication requirements and remote exploitability increase the risk of opportunistic attacks, especially in environments where free5GC is exposed to untrusted networks.
Mitigation Recommendations
Since no patch is currently available, organizations should implement network-level protections to limit exposure of the free5GC UPF and SMF components to untrusted or public networks. Deploy strict firewall rules and access controls to restrict PFCP traffic to trusted management and control plane hosts only. Monitor network traffic for malformed PFCP Association Setup Requests and anomalous PFCP behavior indicative of exploitation attempts. Employ network segmentation to isolate the 5G core network components from other infrastructure. Prepare for rapid deployment of the official patch once released by free5GC maintainers. Additionally, consider deploying redundancy and failover mechanisms for UPF and SMF components to minimize service disruption if an attack occurs. Engage with free5GC community and vendors for updates and best practices. Avoid exposing free5GC control plane interfaces directly to the internet or untrusted environments until patched.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T20:54:04.664Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699ccae3be58cf853bccd9ee
Added to database: 2/23/2026, 9:47:15 PM
Last enriched: 3/3/2026, 1:21:51 AM
Last updated: 4/9/2026, 10:55:45 PM
Views: 139
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.