Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70121: n/a

0
High
VulnerabilityCVE-2025-70121cvecve-2025-70121
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70121 is a denial of service vulnerability in the AMF component of free5GC v4. 0. 1 caused by an array index out of bounds error. The flaw occurs in the GetSUCI method when processing a crafted 5GS Mobile Identity in a NAS Registration Request, leading to a runtime panic and crash of the AMF. This vulnerability can be exploited remotely without authentication by sending a maliciously crafted NAS message. Although no known exploits are currently reported in the wild, successful exploitation can disrupt 5G core network availability. European telecom operators using free5GC for 5G core network functions are at risk, potentially impacting mobile service continuity. Mitigation requires patching the vulnerable component or applying input validation to prevent out-of-bounds access. Countries with advanced 5G deployments and open-source 5G core adoption, such as Germany, France, and the UK, are most likely affected. Given the ease of exploitation and impact on availability, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 02/13/2026, 16:49:14 UTC

Technical Analysis

CVE-2025-70121 identifies a critical vulnerability in the Access and Mobility Management Function (AMF) component of free5GC version 4.0.1, an open-source 5G core network implementation. The vulnerability arises from an array index out of bounds error within the GetSUCI method in the NAS_MobileIdentity5GS.go source file. Specifically, when processing a NAS Registration Request message containing a crafted 5GS Mobile Identity, the code attempts to access the sixth element (index 5) of a 5-element array, which is out of bounds. This leads to a runtime panic in the Go language environment, causing the AMF process to crash and become unavailable. The AMF is a critical 5G core network function responsible for mobility management and session handling. The flaw can be triggered remotely by an attacker sending a malicious NAS Registration Request without requiring authentication or user interaction, enabling a denial of service (DoS) attack that disrupts network availability. While no public exploits are currently known, the vulnerability's nature and the critical role of the AMF make it a significant threat. The lack of a CVSS score indicates that the vulnerability is newly published and pending further assessment. The vulnerability affects free5GC v4.0.1, and no patches or mitigations are currently linked, emphasizing the need for immediate attention from operators using this software.

Potential Impact

The primary impact of CVE-2025-70121 is a denial of service condition in the 5G core network's AMF component, which can lead to service outages or degraded network performance. For European organizations, especially telecom operators deploying free5GC as part of their 5G infrastructure, this vulnerability threatens the availability of mobile services, potentially affecting millions of subscribers. Disruptions in the AMF can cascade, impacting authentication, mobility management, and session continuity, thereby degrading user experience and possibly causing regulatory compliance issues related to service availability. Given the increasing reliance on 5G for critical communications, IoT, and enterprise applications, such outages could have broader economic and operational consequences. The vulnerability does not directly compromise confidentiality or integrity but poses a significant risk to network stability and resilience.

Mitigation Recommendations

To mitigate CVE-2025-70121, European 5G network operators using free5GC v4.0.1 should prioritize the following actions: 1) Apply any available patches or updates from the free5GC project that address the array bounds checking in the GetSUCI method. 2) If patches are not yet available, implement input validation at the NAS message processing layer to ensure that the 5GS Mobile Identity array is properly bounded before access. 3) Deploy runtime monitoring and anomaly detection to identify and block malformed NAS Registration Requests that could trigger the vulnerability. 4) Consider network-level filtering or rate limiting of NAS messages from untrusted sources to reduce attack surface. 5) Engage with the free5GC community and vendors for timely updates and advisories. 6) Conduct thorough testing of the AMF component under malformed input scenarios to validate robustness. These steps go beyond generic advice by focusing on source code validation, runtime protections, and community collaboration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f5286c9e1ff5ad84a5d32

Added to database: 2/13/2026, 4:34:14 PM

Last enriched: 2/13/2026, 4:49:14 PM

Last updated: 2/13/2026, 7:17:11 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats