CVE-2025-69247: CWE-122: Heap-based Buffer Overflow in free5gc go-upf
free5GC go-upf is the User Plane Function (UPF) implementation for 5G networks that is part of the free5GC project. Versions prior to 1.2.8 have a Heap-based Buffer Overflow (CWE-122) vulnerability leading to Denial of Service. Remote attackers can crash the UPF network element by sending a specially crafted PFCP Session Modification Request with an invalid SDF Filter length field. This causes a heap buffer overflow, resulting in complete service disruption for all connected UEs and potential cascading failures affecting the SMF. All deployments of free5GC using the UPF component may be affected. Version 1.2.8 of go-upf contains a fix.
AI Analysis
Technical Summary
The vulnerability CVE-2025-69247 affects the go-upf component of free5GC, an open-source 5G core network implementation. The UPF is critical for handling user plane traffic in 5G networks. The flaw is a heap-based buffer overflow (CWE-122) triggered when the UPF processes a PFCP (Packet Forwarding Control Protocol) Session Modification Request containing an invalid SDF (Service Data Flow) Filter length field. This malformed input causes the UPF to write beyond allocated heap memory, leading to a crash of the UPF process. Since the UPF manages data forwarding for all connected UEs, its failure results in a denial of service affecting the entire user plane. Additionally, the disruption may cascade to the SMF, which manages session control, further impacting network stability. The vulnerability requires no authentication or user interaction and can be exploited remotely by sending crafted PFCP messages. The issue is fixed in free5GC go-upf version 1.2.8. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges or user interaction needed, and limited availability impact. No known exploits have been reported in the wild as of now.
Potential Impact
The primary impact is denial of service on the UPF component of free5GC-based 5G networks. This causes loss of user plane connectivity, effectively disconnecting all user equipment relying on the affected UPF. The resulting service disruption can degrade network availability and user experience significantly. In large-scale deployments, the failure of the UPF may cascade to the SMF and other 5G core functions, amplifying the outage. While confidentiality and integrity are not directly compromised, the availability impact can be severe for operators relying on free5GC for 5G core infrastructure. This can affect telecom operators, enterprises, and service providers deploying free5GC in production or test environments. The low CVSS score reflects the limited scope and impact, but the critical role of UPF in 5G networks means even a denial of service can have operational consequences.
Mitigation Recommendations
Operators and administrators using free5GC should upgrade the go-upf component to version 1.2.8 or later, where the heap overflow vulnerability is patched. Until upgrading, network administrators should implement strict filtering and validation of PFCP messages at network boundaries to block malformed or suspicious PFCP Session Modification Requests. Deploying anomaly detection systems that monitor PFCP traffic for unusual patterns can help identify exploitation attempts. Additionally, isolating the UPF in a hardened network segment and limiting exposure to untrusted networks reduces attack surface. Regularly auditing and updating 5G core components and applying security patches promptly is critical. Testing the UPF under stress and malformed inputs can help identify similar vulnerabilities proactively. Finally, operators should monitor vendor advisories and threat intelligence feeds for any emerging exploits targeting this vulnerability.
Affected Countries
United States, China, South Korea, Japan, Germany, France, India, United Kingdom, Canada, Australia
CVE-2025-69247: CWE-122: Heap-based Buffer Overflow in free5gc go-upf
Description
free5GC go-upf is the User Plane Function (UPF) implementation for 5G networks that is part of the free5GC project. Versions prior to 1.2.8 have a Heap-based Buffer Overflow (CWE-122) vulnerability leading to Denial of Service. Remote attackers can crash the UPF network element by sending a specially crafted PFCP Session Modification Request with an invalid SDF Filter length field. This causes a heap buffer overflow, resulting in complete service disruption for all connected UEs and potential cascading failures affecting the SMF. All deployments of free5GC using the UPF component may be affected. Version 1.2.8 of go-upf contains a fix.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-69247 affects the go-upf component of free5GC, an open-source 5G core network implementation. The UPF is critical for handling user plane traffic in 5G networks. The flaw is a heap-based buffer overflow (CWE-122) triggered when the UPF processes a PFCP (Packet Forwarding Control Protocol) Session Modification Request containing an invalid SDF (Service Data Flow) Filter length field. This malformed input causes the UPF to write beyond allocated heap memory, leading to a crash of the UPF process. Since the UPF manages data forwarding for all connected UEs, its failure results in a denial of service affecting the entire user plane. Additionally, the disruption may cascade to the SMF, which manages session control, further impacting network stability. The vulnerability requires no authentication or user interaction and can be exploited remotely by sending crafted PFCP messages. The issue is fixed in free5GC go-upf version 1.2.8. The CVSS 4.0 vector indicates network attack vector, low complexity, no privileges or user interaction needed, and limited availability impact. No known exploits have been reported in the wild as of now.
Potential Impact
The primary impact is denial of service on the UPF component of free5GC-based 5G networks. This causes loss of user plane connectivity, effectively disconnecting all user equipment relying on the affected UPF. The resulting service disruption can degrade network availability and user experience significantly. In large-scale deployments, the failure of the UPF may cascade to the SMF and other 5G core functions, amplifying the outage. While confidentiality and integrity are not directly compromised, the availability impact can be severe for operators relying on free5GC for 5G core infrastructure. This can affect telecom operators, enterprises, and service providers deploying free5GC in production or test environments. The low CVSS score reflects the limited scope and impact, but the critical role of UPF in 5G networks means even a denial of service can have operational consequences.
Mitigation Recommendations
Operators and administrators using free5GC should upgrade the go-upf component to version 1.2.8 or later, where the heap overflow vulnerability is patched. Until upgrading, network administrators should implement strict filtering and validation of PFCP messages at network boundaries to block malformed or suspicious PFCP Session Modification Requests. Deploying anomaly detection systems that monitor PFCP traffic for unusual patterns can help identify exploitation attempts. Additionally, isolating the UPF in a hardened network segment and limiting exposure to untrusted networks reduces attack surface. Regularly auditing and updating 5G core components and applying security patches promptly is critical. Testing the UPF under stress and malformed inputs can help identify similar vulnerabilities proactively. Finally, operators should monitor vendor advisories and threat intelligence feeds for any emerging exploits targeting this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-30T14:06:18.104Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699ccae3be58cf853bccd9f2
Added to database: 2/23/2026, 9:47:15 PM
Last enriched: 2/23/2026, 10:02:09 PM
Last updated: 2/24/2026, 4:12:41 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3068: SQL Injection in itsourcecode Document Management System
MediumCVE-2026-3067: Path Traversal in HummerRisk
MediumCVE-2026-3066: Command Injection in HummerRisk
MediumCVE-2026-3091: Uncontrolled Search Path Element in Synology Synology Presto Client
MediumCVE-2026-3065: Command Injection in HummerRisk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.