Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69251: CWE-20: Improper Input Validation in free5gc udm

0
Medium
VulnerabilityCVE-2025-69251cvecve-2025-69251cwe-20
Published: Mon Feb 23 2026 (02/23/2026, 23:53:03 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udm

Description

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:18:19 UTC

Technical Analysis

The vulnerability identified as CVE-2025-69251 affects the Unified Data Management (UDM) component of free5GC, an open-source 5G core network implementation. Specifically, versions up to and including 1.4.1 of free5gc UDM improperly validate input for the ueId parameter in the Nudm_UECM service. Attackers can inject control characters such as the null byte (%00), which are not properly sanitized before URL parsing. This leads to internal errors in the net/url package, revealing system implementation details through error messages. Such information disclosure can assist attackers in fingerprinting the service and understanding its internal workings, which may facilitate further targeted attacks. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The issue is classified under CWE-20 (Improper Input Validation). Although no direct application-level workaround exists, the free5gc project has addressed the vulnerability in pull request 76, which should be applied to affected deployments to remediate the issue.

Potential Impact

The primary impact of CVE-2025-69251 is information disclosure through error messages that reveal internal system details. This can aid attackers in service fingerprinting, enabling them to tailor subsequent attacks more effectively. While the vulnerability does not directly allow code execution or denial of service, the leakage of implementation details can lower the barrier for more severe exploits. Given that free5GC UDM is a critical component in 5G core networks responsible for subscriber data management, attackers gaining reconnaissance information could target these networks to disrupt services or compromise subscriber data. The vulnerability affects all deployments using the Nudm_UECM service of free5GC UDM up to version 1.4.1, potentially impacting telecom operators and infrastructure providers relying on this open-source 5G core solution. The ease of remote exploitation without authentication increases the risk profile, especially in environments where the UDM service is exposed or insufficiently segmented.

Mitigation Recommendations

To mitigate CVE-2025-69251, organizations should promptly apply the official patch provided in free5gc/udm pull request 76, which properly sanitizes and validates the ueId parameter to prevent control character injection. Network-level protections should be implemented to restrict access to the Nudm_UECM service, limiting exposure to trusted internal networks or VPNs. Deploying Web Application Firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with rules to detect and block suspicious control character sequences in URL parameters can provide additional defense layers. Monitoring logs for URL parsing errors or unusual input patterns can help detect attempted exploitation. As no application-level workaround exists, patching remains the most effective remediation. Additionally, organizations should follow secure coding practices for input validation in custom modifications and keep free5GC components updated to the latest secure versions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:07:23.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cee30be58cf853bef4e6b

Added to database: 2/24/2026, 12:17:52 AM

Last enriched: 3/3/2026, 1:18:19 AM

Last updated: 4/9/2026, 10:47:05 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses