Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69247: CWE-122: Heap-based Buffer Overflow in free5gc go-upf

0
Low
VulnerabilityCVE-2025-69247cvecve-2025-69247cwe-122
Published: Mon Feb 23 2026 (02/23/2026, 21:38:15 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: go-upf

Description

free5GC go-upf is the User Plane Function (UPF) implementation for 5G networks that is part of the free5GC project. Versions prior to 1.2.8 have a Heap-based Buffer Overflow (CWE-122) vulnerability leading to Denial of Service. Remote attackers can crash the UPF network element by sending a specially crafted PFCP Session Modification Request with an invalid SDF Filter length field. This causes a heap buffer overflow, resulting in complete service disruption for all connected UEs and potential cascading failures affecting the SMF. All deployments of free5GC using the UPF component may be affected. Version 1.2.8 of go-upf contains a fix.

AI-Powered Analysis

AILast updated: 02/23/2026, 22:02:09 UTC

Technical Analysis

The vulnerability CVE-2025-69247 affects the go-upf component of free5GC, an open-source 5G core network implementation. The UPF is critical for handling user plane traffic in 5G networks. The flaw is a heap-based buffer overflow (CWE-122) triggered when the UPF processes a PFCP (Packet Forwarding Control Protocol) Session Modification Request containing an invalid SDF (Service Data Flow) Filter length field. This malformed input causes the UPF to write beyond allocated heap memory, leading to a crash of the UPF process. Since the UPF manages data forwarding for all connected UEs, its failure results in a denial of service affecting the entire user plane. Additionally, the disruption may cascade to the SMF, which manages session control, further impacting network stability. The vulnerability requires no authentication or user interaction and can be exploited remotely by sending crafted PFCP messages. The issue is fixed in free5GC go-upf version 1.2.8. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges or user interaction needed, and limited availability impact. No known exploits have been reported in the wild as of now.

Potential Impact

The primary impact is denial of service on the UPF component of free5GC-based 5G networks. This causes loss of user plane connectivity, effectively disconnecting all user equipment relying on the affected UPF. The resulting service disruption can degrade network availability and user experience significantly. In large-scale deployments, the failure of the UPF may cascade to the SMF and other 5G core functions, amplifying the outage. While confidentiality and integrity are not directly compromised, the availability impact can be severe for operators relying on free5GC for 5G core infrastructure. This can affect telecom operators, enterprises, and service providers deploying free5GC in production or test environments. The low CVSS score reflects the limited scope and impact, but the critical role of UPF in 5G networks means even a denial of service can have operational consequences.

Mitigation Recommendations

Operators and administrators using free5GC should upgrade the go-upf component to version 1.2.8 or later, where the heap overflow vulnerability is patched. Until upgrading, network administrators should implement strict filtering and validation of PFCP messages at network boundaries to block malformed or suspicious PFCP Session Modification Requests. Deploying anomaly detection systems that monitor PFCP traffic for unusual patterns can help identify exploitation attempts. Additionally, isolating the UPF in a hardened network segment and limiting exposure to untrusted networks reduces attack surface. Regularly auditing and updating 5G core components and applying security patches promptly is critical. Testing the UPF under stress and malformed inputs can help identify similar vulnerabilities proactively. Finally, operators should monitor vendor advisories and threat intelligence feeds for any emerging exploits targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:06:18.104Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699ccae3be58cf853bccd9f2

Added to database: 2/23/2026, 9:47:15 PM

Last enriched: 2/23/2026, 10:02:09 PM

Last updated: 2/24/2026, 4:12:41 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats