CVE-2025-69250: CWE-754: Improper Check for Unusual or Exceptional Conditions in free5gc udm
free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt parsing errors) to remote clients when processing invalid pduSessionId inputs. This exposes implementation details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM DELETE service may be vulnerable. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
AI Analysis
Technical Summary
CVE-2025-69250 is a vulnerability classified under CWE-754, indicating improper checks for unusual or exceptional conditions within the free5gc UDM component, which is part of the open-source 5G core network implementation free5GC. Specifically, in versions up to and including 1.4.1, the UDM service leaks detailed internal error messages when processing invalid pduSessionId inputs in the Nudm_UECM DELETE service. These error messages include parsing errors such as strconv.ParseInt failures, which reveal internal implementation details to unauthenticated remote clients. This leakage can be exploited for service fingerprinting, allowing attackers to gain insight into the backend system's behavior and potentially identify further attack vectors. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The issue arises from insufficient validation and error handling logic that fails to suppress or generalize error messages before sending them to clients. The free5gc project has addressed this vulnerability in pull request 76, which corrects the error handling to prevent detailed error disclosure. No direct workaround exists at the application level, so applying the official patch is the recommended remediation. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:H/VI:N/VA:N) reflects a network attack vector with low complexity, no privileges or user interaction required, and high confidentiality impact due to information disclosure, but no impact on integrity or availability.
Potential Impact
The primary impact of CVE-2025-69250 is information disclosure through detailed error message leakage. This can aid attackers in fingerprinting the free5gc UDM service, revealing internal implementation details such as parsing logic and error handling behavior. Such reconnaissance can facilitate more targeted attacks against the 5G core network infrastructure, potentially leading to exploitation of other vulnerabilities or unauthorized access. Although this vulnerability does not directly compromise data integrity or availability, the exposure of internal error details weakens the security posture and increases the attack surface. Organizations deploying free5GC UDM in their 5G core networks may face increased risk of targeted attacks, especially from advanced persistent threats or nation-state actors interested in telecommunications infrastructure. Given the critical role of UDM in subscriber data management and authentication within 5G networks, any compromise or reconnaissance advantage can have significant downstream effects on network security and user privacy.
Mitigation Recommendations
To mitigate CVE-2025-69250, organizations should promptly apply the official patch provided in free5gc/udm pull request 76, which corrects the error handling logic to prevent detailed error message leakage. Since no direct application-level workaround is available, patching is the primary remediation step. Additionally, organizations should implement network-level protections such as restricting access to the Nudm_UECM DELETE service to trusted management networks or VPNs to reduce exposure to unauthenticated remote clients. Employing Web Application Firewalls (WAFs) or Intrusion Detection/Prevention Systems (IDS/IPS) with signatures tuned to detect anomalous requests or error message patterns can help detect and block exploitation attempts. Regularly auditing and monitoring logs for unusual error message patterns or repeated invalid pduSessionId requests can provide early warning of reconnaissance activity. Finally, maintaining an up-to-date inventory of free5GC components and versions deployed across the network will facilitate timely patch management and vulnerability response.
Affected Countries
United States, China, South Korea, Japan, Germany, France, United Kingdom, India, Brazil, Russia, Canada, Australia, Italy, Spain
CVE-2025-69250: CWE-754: Improper Check for Unusual or Exceptional Conditions in free5gc udm
Description
free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt parsing errors) to remote clients when processing invalid pduSessionId inputs. This exposes implementation details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM DELETE service may be vulnerable. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
AI-Powered Analysis
Technical Analysis
CVE-2025-69250 is a vulnerability classified under CWE-754, indicating improper checks for unusual or exceptional conditions within the free5gc UDM component, which is part of the open-source 5G core network implementation free5GC. Specifically, in versions up to and including 1.4.1, the UDM service leaks detailed internal error messages when processing invalid pduSessionId inputs in the Nudm_UECM DELETE service. These error messages include parsing errors such as strconv.ParseInt failures, which reveal internal implementation details to unauthenticated remote clients. This leakage can be exploited for service fingerprinting, allowing attackers to gain insight into the backend system's behavior and potentially identify further attack vectors. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The issue arises from insufficient validation and error handling logic that fails to suppress or generalize error messages before sending them to clients. The free5gc project has addressed this vulnerability in pull request 76, which corrects the error handling to prevent detailed error disclosure. No direct workaround exists at the application level, so applying the official patch is the recommended remediation. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:H/VI:N/VA:N) reflects a network attack vector with low complexity, no privileges or user interaction required, and high confidentiality impact due to information disclosure, but no impact on integrity or availability.
Potential Impact
The primary impact of CVE-2025-69250 is information disclosure through detailed error message leakage. This can aid attackers in fingerprinting the free5gc UDM service, revealing internal implementation details such as parsing logic and error handling behavior. Such reconnaissance can facilitate more targeted attacks against the 5G core network infrastructure, potentially leading to exploitation of other vulnerabilities or unauthorized access. Although this vulnerability does not directly compromise data integrity or availability, the exposure of internal error details weakens the security posture and increases the attack surface. Organizations deploying free5GC UDM in their 5G core networks may face increased risk of targeted attacks, especially from advanced persistent threats or nation-state actors interested in telecommunications infrastructure. Given the critical role of UDM in subscriber data management and authentication within 5G networks, any compromise or reconnaissance advantage can have significant downstream effects on network security and user privacy.
Mitigation Recommendations
To mitigate CVE-2025-69250, organizations should promptly apply the official patch provided in free5gc/udm pull request 76, which corrects the error handling logic to prevent detailed error message leakage. Since no direct application-level workaround is available, patching is the primary remediation step. Additionally, organizations should implement network-level protections such as restricting access to the Nudm_UECM DELETE service to trusted management networks or VPNs to reduce exposure to unauthenticated remote clients. Employing Web Application Firewalls (WAFs) or Intrusion Detection/Prevention Systems (IDS/IPS) with signatures tuned to detect anomalous requests or error message patterns can help detect and block exploitation attempts. Regularly auditing and monitoring logs for unusual error message patterns or repeated invalid pduSessionId requests can provide early warning of reconnaissance activity. Finally, maintaining an up-to-date inventory of free5GC components and versions deployed across the network will facilitate timely patch management and vulnerability response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-30T14:07:18.370Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699ceab4be58cf853bdfbf54
Added to database: 2/24/2026, 12:03:00 AM
Last enriched: 2/24/2026, 12:16:32 AM
Last updated: 2/24/2026, 1:04:09 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3049: Open Redirect in horilla-opensource horilla
MediumCVE-2026-3046: SQL Injection in itsourcecode E-Logbook with Health Monitoring System for COVID-19
MediumCVE-2026-27643: CWE-209: Generation of Error Message Containing Sensitive Information in free5gc udr
MediumCVE-2026-27642: CWE-20: Improper Input Validation in free5gc udm
MediumCVE-2026-26025: CWE-476: NULL Pointer Dereference in free5gc smf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.