Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69248: CWE-129: Improper Validation of Array Index in free5gc amf

0
Medium
VulnerabilityCVE-2025-69248cvecve-2025-69248cwe-129
Published: Mon Feb 23 2026 (02/23/2026, 21:42:46 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: amf

Description

free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of free5GC's AMF service have a Buffer Overflow vulnerability leading to Denial of Service. Remote unauthenticated attackers can crash the AMF service by sending a specially crafted NAS Registration Request with a malformed 5GS Mobile Identity, causing complete denial of service for the 5G core network. All deployments of free5GC using the AMF component may be affected. Pull request 43 of the free5gc/nas repo contains a fix. No direct workaround is available at the application level. Applying the official patch is recommended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:20:44 UTC

Technical Analysis

The vulnerability CVE-2025-69248 affects the Access and Mobility Management Function (AMF) component of free5GC, an open-source 5G core network implementation. The root cause is improper validation of array indices (CWE-129) when handling the 5GS Mobile Identity field within NAS Registration Requests. Specifically, the AMF service does not adequately check the bounds of an array before accessing it, leading to a buffer overflow condition. This flaw can be triggered remotely by sending a specially crafted NAS Registration Request with a malformed 5GS Mobile Identity, without requiring any authentication or user interaction. Exploiting this vulnerability causes the AMF service to crash, resulting in a denial of service for the 5G core network relying on free5GC. The impact is significant because the AMF is a critical component responsible for managing mobility and session states in 5G networks. The vulnerability affects all free5GC AMF versions up to and including 1.4.1. The free5GC project has addressed this issue in pull request 43 of the free5gc/nas repository, which includes proper bounds checking to prevent buffer overflow. No direct application-level workarounds are available, so applying the official patch is the recommended mitigation. The CVSS v4.0 score is 6.6 (medium severity), reflecting the network attack vector, no required privileges or user interaction, but a high impact on availability. No known exploits have been reported in the wild yet, but the vulnerability poses a risk to any organization deploying free5GC AMF in production 5G core networks.

Potential Impact

The primary impact of this vulnerability is a denial of service condition on the AMF service, which is a critical component of the 5G core network. Disruption of the AMF can lead to loss of mobility management, session establishment, and overall network availability for subscribers relying on the affected 5G core. This can degrade or completely halt 5G network services, affecting end users and dependent applications. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks from anywhere on the network, potentially causing widespread outages. Organizations deploying free5GC AMF in production environments, including telecom operators, private 5G network providers, and research institutions, face operational risks and potential service-level agreement breaches. The inability to process legitimate NAS Registration Requests may also impact subscriber onboarding and mobility, leading to customer dissatisfaction and revenue loss. Although no data confidentiality or integrity impact is indicated, the availability impact alone is significant for critical 5G infrastructure.

Mitigation Recommendations

The definitive mitigation is to apply the official patch provided in pull request 43 of the free5gc/nas repository, which corrects the improper array index validation and prevents buffer overflow. Organizations should upgrade their free5GC AMF component to a version later than 1.4.1 that includes this fix. Until patching is possible, network operators should implement network-level protections such as filtering or rate limiting NAS Registration Requests from untrusted sources to reduce exposure. Monitoring and alerting on AMF service crashes or abnormal NAS message patterns can help detect exploitation attempts early. Deploying intrusion detection systems (IDS) with signatures for malformed NAS messages may provide additional defense. It is also advisable to isolate the AMF service within secure network segments and restrict access to trusted management and signaling networks. Regularly auditing and updating open-source 5G core components is critical to maintain security posture. Finally, organizations should prepare incident response plans for potential DoS events impacting 5G core services.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:06:53.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699ccae3be58cf853bccd9f8

Added to database: 2/23/2026, 9:47:15 PM

Last enriched: 3/3/2026, 1:20:44 AM

Last updated: 4/10/2026, 7:20:27 AM

Views: 164

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses