Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69253: CWE-209: Generation of Error Message Containing Sensitive Information in free5gc udr

0
Medium
VulnerabilityCVE-2025-69253cvecve-2025-69253cwe-209
Published: Tue Feb 24 2026 (02/24/2026, 00:01:05 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udr

Description

free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Information Exposure. The NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be vulnerable. free5gc/udr pull request 56 contains a patch. No direct workaround is available at the application level. Applying the official patch is recommended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:38:48 UTC

Technical Analysis

CVE-2025-69253 affects the User Data Repository (udr) component of free5GC, an open-source 5G core network implementation. The vulnerability arises from improper error handling (CWE-209) where the NEF component leaks detailed internal parsing error messages to unauthenticated remote clients. For example, error messages such as "invalid character 'n' after top-level value" are returned, revealing internal processing details. This occurs in versions up to and including 1.4.1, specifically impacting the Nnef_PfdManagement service. Such detailed error messages can aid attackers in service fingerprinting, reconnaissance, and potentially facilitate further exploitation by revealing implementation details or parsing logic. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The issue is addressed by a patch available in free5gc/udr pull request 56, which removes or sanitizes sensitive error information from responses. No direct workaround exists at the application level, so applying the official patch is the recommended remediation. The CVSS 4.0 base score is 6.6 (medium severity), reflecting the vulnerability's impact on confidentiality due to information exposure, ease of exploitation, and lack of authentication requirements. No known active exploits have been reported to date.

Potential Impact

The primary impact of this vulnerability is information disclosure that can aid attackers in fingerprinting the free5GC udr service and understanding its internal parsing mechanisms. This reconnaissance can facilitate more targeted attacks against 5G core network infrastructure, potentially leading to further exploitation or disruption. Since free5GC is used in 5G mobile core networks, exploitation could compromise the confidentiality of network operations and user data indirectly by enabling attackers to craft more effective attacks. Although this vulnerability does not directly allow code execution or denial of service, the leaked information reduces the security posture of affected deployments. Organizations deploying free5GC udr in production environments, especially telecommunications providers and infrastructure operators, face increased risk of targeted attacks and should prioritize remediation to maintain network security and trust.

Mitigation Recommendations

1. Apply the official patch from free5gc/udr pull request 56 immediately to eliminate sensitive error message leakage. 2. Restrict network access to the Nnef_PfdManagement service using network segmentation and firewall rules to limit exposure to trusted entities only. 3. Implement monitoring and alerting for unusual or repeated error message requests that may indicate reconnaissance activity. 4. Conduct regular security assessments and code reviews of free5GC components to identify and remediate similar error handling issues. 5. Consider deploying Web Application Firewalls (WAFs) or API gateways that can sanitize error messages before they reach external clients. 6. Maintain up-to-date software versions and subscribe to free5GC security advisories to promptly address future vulnerabilities. 7. Educate operational teams about the risks of information leakage and the importance of minimizing error detail exposure in production environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-30T14:07:48.460Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604cb

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 3/3/2026, 8:38:48 PM

Last updated: 4/9/2026, 1:31:40 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses