Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69251: CWE-20: Improper Input Validation in free5gc udm

0
Medium
VulnerabilityCVE-2025-69251cvecve-2025-69251cwe-20
Published: Mon Feb 23 2026 (02/23/2026, 23:53:03 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udm

Description

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

AI-Powered Analysis

AILast updated: 02/24/2026, 00:32:51 UTC

Technical Analysis

CVE-2025-69251 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the Unified Data Management (UDM) component of free5GC, an open-source 5G mobile core network implementation. Specifically, in versions up to and including 1.4.1, the UDM's Nudm_UECM service fails to properly sanitize the ueId parameter. Attackers can inject control characters such as the null byte (%00), which leads to internal URL parsing errors within the Go net/url package, manifesting as 'invalid control character' errors. These errors inadvertently expose internal system implementation details through error messages or abnormal responses. Such information disclosure can assist attackers in fingerprinting the service, understanding its internal workings, and potentially identifying further vulnerabilities or misconfigurations. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality impact is high due to information leakage. The free5gc project has addressed this issue in pull request 76, which sanitizes input to prevent control character injection. No alternative workarounds exist at the application level, making patching the definitive mitigation. This vulnerability highlights the importance of rigorous input validation in telecom core network components, which are critical infrastructure elements in 5G deployments.

Potential Impact

The primary impact of CVE-2025-69251 is information disclosure through improper input validation leading to internal URL parsing errors. This leakage of system implementation details can aid attackers in service fingerprinting, enabling them to map the network architecture and identify potential attack vectors. For organizations deploying free5GC UDM in their 5G core networks, this vulnerability can facilitate reconnaissance activities by threat actors, including nation-state adversaries and cybercriminals targeting telecom infrastructure. While it does not directly allow unauthorized data modification, code execution, or denial of service, the exposed information can be leveraged in multi-stage attacks, increasing the overall risk. Given the critical role of UDM in subscriber data management and authentication in 5G networks, any compromise or reconnaissance advantage can have cascading effects on network security and user privacy. The vulnerability's remote exploitability without authentication further elevates the threat, especially in environments where the UDM service is exposed or insufficiently segmented. This could lead to targeted attacks against telecom operators, infrastructure providers, and enterprises using open-source 5G core solutions.

Mitigation Recommendations

1. Apply the official patch from free5gc pull request 76 immediately to all affected UDM deployments to sanitize the ueId parameter and prevent control character injection. 2. Implement strict input validation and sanitization at the network ingress points, including web application firewalls or API gateways, to block malformed or suspicious ueId values before they reach the UDM service. 3. Employ network segmentation and access controls to restrict exposure of the Nudm_UECM service to trusted internal networks only, minimizing the attack surface. 4. Monitor logs and error messages for unusual URL parsing errors or malformed requests indicative of exploitation attempts. 5. Conduct regular security assessments and fuzz testing on telecom core network components to identify similar input validation weaknesses proactively. 6. Coordinate with the free5gc open-source community for timely updates and security advisories to stay ahead of emerging vulnerabilities. 7. Consider deploying runtime application self-protection (RASP) or anomaly detection tools tailored for 5G core network services to detect and block exploitation attempts in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:07:23.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cee30be58cf853bef4e6b

Added to database: 2/24/2026, 12:17:52 AM

Last enriched: 2/24/2026, 12:32:51 AM

Last updated: 2/24/2026, 4:12:39 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats