Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69253: CWE-209: Generation of Error Message Containing Sensitive Information in free5gc udr

0
Medium
VulnerabilityCVE-2025-69253cvecve-2025-69253cwe-209
Published: Tue Feb 24 2026 (02/24/2026, 00:01:05 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udr

Description

CVE-2025-69253 is a medium severity vulnerability in free5GC's User Data Repository (udr) component, versions up to 1. 4. 1. It involves improper error handling where detailed internal parsing error messages are exposed to remote clients via the NEF component, specifically through the Nnef_PfdManagement service. This information leakage can aid attackers in fingerprinting the service and potentially crafting targeted attacks. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Although no direct application-level workaround exists, an official patch is available in free5gc/udr pull request 56 and should be applied promptly. There are no known exploits in the wild at this time. Organizations deploying free5GC in their 5G core networks should prioritize patching to prevent reconnaissance and information disclosure risks.

AI-Powered Analysis

AILast updated: 02/24/2026, 01:04:34 UTC

Technical Analysis

CVE-2025-69253 is a vulnerability classified under CWE-209 (Generation of Error Message Containing Sensitive Information) affecting the free5GC open-source 5G core network project, specifically the User Data Repository (udr) component up to version 1.4.1. The flaw arises from improper error handling in the Network Exposure Function (NEF) component, which leaks detailed internal parsing error messages to unauthenticated remote clients. For example, error messages may reveal specific parsing failures such as invalid characters encountered during JSON processing (e.g., 'invalid character 'n' after top-level value'). This leakage occurs when using the Nnef_PfdManagement service, which is part of the NEF interface responsible for managing policy flow descriptions. Such detailed error information can be exploited by attackers to fingerprint the service implementation, identify software versions, and potentially discover additional vulnerabilities or misconfigurations. The vulnerability has a CVSS 4.0 base score of 6.6, reflecting medium severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality due to information exposure. The vulnerability was publicly disclosed on February 24, 2026, with no known active exploits. The free5GC project has addressed the issue in pull request 56 for the udr component, providing a patch that suppresses or sanitizes error messages to prevent sensitive information leakage. No direct workaround exists at the application level, making patching the primary mitigation strategy.

Potential Impact

The primary impact of CVE-2025-69253 is the exposure of sensitive internal error details to unauthenticated remote attackers. This information leakage can facilitate service fingerprinting, allowing attackers to identify the exact version and configuration of the free5GC udr component in use. Such reconnaissance can be leveraged to tailor further attacks, including exploitation of other vulnerabilities or targeted denial-of-service attempts. While the vulnerability does not directly allow code execution or data manipulation, the confidentiality breach can undermine the security posture of 5G core network deployments. Given that free5GC is used in 5G mobile core networks, affected organizations include telecom operators, infrastructure providers, and enterprises deploying private 5G networks. Exploitation could lead to increased risk of subsequent attacks on critical telecommunications infrastructure, potentially impacting service availability and user privacy. The lack of authentication or user interaction requirements makes the attack vector broad and accessible to remote adversaries. However, the impact is somewhat limited by the nature of the information disclosed, which is primarily useful for reconnaissance rather than immediate exploitation.

Mitigation Recommendations

To mitigate CVE-2025-69253, organizations should apply the official patch provided by the free5GC project in pull request 56 for the udr component as soon as possible. This patch addresses the improper error handling by sanitizing or suppressing detailed parsing error messages exposed to remote clients. Since no direct application-level workaround exists, patching is the only effective remediation. Additionally, organizations should implement network-level protections such as restricting access to the NEF interfaces, especially the Nnef_PfdManagement service, to trusted management networks or via VPNs to reduce exposure to unauthenticated attackers. Employing Web Application Firewalls (WAFs) or Intrusion Detection/Prevention Systems (IDS/IPS) with signatures tuned to detect anomalous requests or error message patterns can help detect exploitation attempts. Regularly monitoring logs for unusual error message requests or repeated parsing failures can provide early warning signs of reconnaissance activity. Finally, maintaining up-to-date inventories of free5GC components and versions deployed across the network will facilitate timely vulnerability management and patch deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:07:48.460Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604cb

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 2/24/2026, 1:04:34 AM

Last updated: 2/24/2026, 6:17:27 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats