Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69250: CWE-754: Improper Check for Unusual or Exceptional Conditions in free5gc udm

0
Medium
VulnerabilityCVE-2025-69250cvecve-2025-69250cwe-754cwe-20
Published: Mon Feb 23 2026 (02/23/2026, 23:45:02 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udm

Description

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt parsing errors) to remote clients when processing invalid pduSessionId inputs. This exposes implementation details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM DELETE service may be vulnerable. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

AI-Powered Analysis

AILast updated: 02/24/2026, 00:16:32 UTC

Technical Analysis

CVE-2025-69250 is a vulnerability classified under CWE-754, indicating improper checks for unusual or exceptional conditions within the free5gc UDM component, which is part of the open-source 5G core network implementation free5GC. Specifically, in versions up to and including 1.4.1, the UDM service leaks detailed internal error messages when processing invalid pduSessionId inputs in the Nudm_UECM DELETE service. These error messages include parsing errors such as strconv.ParseInt failures, which reveal internal implementation details to unauthenticated remote clients. This leakage can be exploited for service fingerprinting, allowing attackers to gain insight into the backend system's behavior and potentially identify further attack vectors. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The issue arises from insufficient validation and error handling logic that fails to suppress or generalize error messages before sending them to clients. The free5gc project has addressed this vulnerability in pull request 76, which corrects the error handling to prevent detailed error disclosure. No direct workaround exists at the application level, so applying the official patch is the recommended remediation. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:H/VI:N/VA:N) reflects a network attack vector with low complexity, no privileges or user interaction required, and high confidentiality impact due to information disclosure, but no impact on integrity or availability.

Potential Impact

The primary impact of CVE-2025-69250 is information disclosure through detailed error message leakage. This can aid attackers in fingerprinting the free5gc UDM service, revealing internal implementation details such as parsing logic and error handling behavior. Such reconnaissance can facilitate more targeted attacks against the 5G core network infrastructure, potentially leading to exploitation of other vulnerabilities or unauthorized access. Although this vulnerability does not directly compromise data integrity or availability, the exposure of internal error details weakens the security posture and increases the attack surface. Organizations deploying free5GC UDM in their 5G core networks may face increased risk of targeted attacks, especially from advanced persistent threats or nation-state actors interested in telecommunications infrastructure. Given the critical role of UDM in subscriber data management and authentication within 5G networks, any compromise or reconnaissance advantage can have significant downstream effects on network security and user privacy.

Mitigation Recommendations

To mitigate CVE-2025-69250, organizations should promptly apply the official patch provided in free5gc/udm pull request 76, which corrects the error handling logic to prevent detailed error message leakage. Since no direct application-level workaround is available, patching is the primary remediation step. Additionally, organizations should implement network-level protections such as restricting access to the Nudm_UECM DELETE service to trusted management networks or VPNs to reduce exposure to unauthenticated remote clients. Employing Web Application Firewalls (WAFs) or Intrusion Detection/Prevention Systems (IDS/IPS) with signatures tuned to detect anomalous requests or error message patterns can help detect and block exploitation attempts. Regularly auditing and monitoring logs for unusual error message patterns or repeated invalid pduSessionId requests can provide early warning of reconnaissance activity. Finally, maintaining an up-to-date inventory of free5GC components and versions deployed across the network will facilitate timely patch management and vulnerability response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:07:18.370Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699ceab4be58cf853bdfbf54

Added to database: 2/24/2026, 12:03:00 AM

Last enriched: 2/24/2026, 12:16:32 AM

Last updated: 2/24/2026, 1:04:09 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats