Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69250: CWE-754: Improper Check for Unusual or Exceptional Conditions in free5gc udm

0
Medium
VulnerabilityCVE-2025-69250cvecve-2025-69250cwe-754cwe-20
Published: Mon Feb 23 2026 (02/23/2026, 23:45:02 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udm

Description

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt parsing errors) to remote clients when processing invalid pduSessionId inputs. This exposes implementation details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM DELETE service may be vulnerable. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:19:02 UTC

Technical Analysis

CVE-2025-69250 affects the Unified Data Management (UDM) component of free5gc, an open-source 5G core network implementation. Specifically, versions up to and including 1.4.1 of free5gc UDM improperly handle exceptional conditions when processing invalid pduSessionId inputs in the Nudm_UECM DELETE service. Instead of gracefully handling errors, the service leaks detailed internal error messages such as strconv.ParseInt parsing errors back to remote clients. This behavior reveals sensitive implementation details that can be leveraged for service fingerprinting and reconnaissance by attackers. The root cause is an improper check for unusual or exceptional conditions (CWE-754) combined with insufficient input validation (CWE-20). The vulnerability can be exploited remotely without authentication or user interaction, increasing its accessibility to attackers. Although the vulnerability does not directly allow unauthorized data access or service disruption, the information disclosure can aid attackers in crafting targeted attacks against the 5G core network infrastructure. The issue has been addressed in free5gc/udm pull request 76, which corrects error handling to prevent leakage of internal messages. No direct application-level workarounds exist, so applying the official patch is the recommended mitigation. This vulnerability highlights the importance of robust error handling and input validation in critical telecom infrastructure components.

Potential Impact

The primary impact of CVE-2025-69250 is information disclosure through detailed error message leakage. This exposure can facilitate service fingerprinting, allowing attackers to identify the presence and version of free5gc UDM components in 5G core networks. While it does not directly compromise confidentiality, integrity, or availability, the reconnaissance advantage gained can enable more precise and effective follow-on attacks, such as targeted exploitation of other vulnerabilities or network mapping. For organizations operating 5G core networks using free5gc, this vulnerability increases the attack surface and reduces operational security. Given the critical role of UDM in subscriber data management and authentication workflows, any compromise or targeted attack enabled by reconnaissance could have severe downstream effects. The vulnerability's ease of exploitation without authentication or user interaction further elevates its risk profile. However, the lack of known exploits in the wild currently limits immediate threat. Organizations should treat this vulnerability seriously to maintain the security posture of their 5G infrastructure.

Mitigation Recommendations

1. Apply the official patch from free5gc/udm pull request 76 promptly to eliminate detailed error message leakage. 2. Implement network-level filtering and access controls to restrict exposure of the UDM Nudm_UECM DELETE service to trusted management networks only. 3. Employ Web Application Firewalls (WAFs) or API gateways capable of sanitizing error responses and blocking malformed pduSessionId inputs. 4. Conduct thorough input validation and error handling reviews across all 5G core network components to prevent similar information disclosure issues. 5. Monitor network traffic for abnormal requests targeting the Nudm_UECM DELETE endpoint to detect potential reconnaissance attempts. 6. Maintain up-to-date vulnerability management processes to quickly identify and remediate emerging issues in open-source telecom software. 7. Engage in regular security testing, including fuzzing and penetration testing, focused on input validation and error handling in critical telecom services. 8. Collaborate with the free5gc community to stay informed about security updates and best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:07:18.370Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699ceab4be58cf853bdfbf54

Added to database: 2/24/2026, 12:03:00 AM

Last enriched: 3/3/2026, 1:19:02 AM

Last updated: 4/8/2026, 9:22:27 PM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses