Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70122: n/a

0
High
VulnerabilityCVE-2025-70122cvecve-2025-70122
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-70122 is a heap buffer overflow vulnerability in the UPF component of free5GC v4. 0. 1. It is triggered by a crafted PFCP Session Modification Request that causes a runtime panic and crash of the UPF. The flaw exists in the SDFFilterFields. UnmarshalBinary function when processing a declared length that exceeds the actual buffer size. This vulnerability allows remote attackers to cause a denial of service without requiring authentication or user interaction. No known exploits are currently reported in the wild. The vulnerability affects 5G core network infrastructure using free5GC, potentially disrupting mobile network services. European telecom operators deploying free5GC UPF components are at risk.

AI-Powered Analysis

AILast updated: 02/13/2026, 16:49:00 UTC

Technical Analysis

CVE-2025-70122 identifies a heap buffer overflow vulnerability in the User Plane Function (UPF) component of free5GC version 4.0.1, an open-source 5G core network implementation. The vulnerability arises in the SDFFilterFields.UnmarshalBinary function within the sdf-filter.go source file. This function processes PFCP (Packet Forwarding Control Protocol) Session Modification Requests, specifically handling filter fields that include a declared length parameter. The flaw occurs when the declared length exceeds the actual buffer capacity, leading to an out-of-bounds write on the heap. This causes a runtime panic in the Go runtime environment, crashing the UPF process. Since the UPF is critical for forwarding user data traffic in 5G networks, its crash results in denial of service (DoS) conditions. The vulnerability can be triggered remotely by sending a crafted PFCP Session Modification Request, which does not require prior authentication or user interaction, increasing the risk of exploitation. Although no public exploits are currently known, the nature of the vulnerability and its impact on core network availability make it a significant threat. The absence of a CVSS score suggests the need for a severity assessment based on impact and exploitability factors. The vulnerability affects deployments of free5GC v4.0.1, commonly used by telecom operators and enterprises implementing 5G core networks. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate mitigation strategies.

Potential Impact

For European organizations, particularly telecom operators and mobile network providers deploying free5GC as part of their 5G infrastructure, this vulnerability poses a serious risk to network availability and service continuity. A successful exploit can cause the UPF to crash, disrupting user plane traffic and potentially leading to widespread denial of service for subscribers. This can affect critical communications, emergency services, and enterprise connectivity relying on 5G networks. The disruption could also impact roaming services and inter-operator connectivity within Europe. Given the increasing reliance on 5G for industrial automation, IoT, and smart city applications, the operational impact could extend beyond traditional telecom services. Moreover, the ease of remote exploitation without authentication increases the threat landscape, potentially allowing malicious actors or state-sponsored groups to target European telecom infrastructure. The reputational damage and regulatory consequences under GDPR and NIS Directive for service outages further amplify the impact for affected organizations.

Mitigation Recommendations

European organizations should immediately audit their 5G core network deployments to identify instances of free5GC v4.0.1 UPF components. Until an official patch is released, network operators should implement strict network-level filtering to block unauthorized or suspicious PFCP Session Modification Requests from untrusted sources. Deploying anomaly detection systems to monitor PFCP traffic for malformed or unusually large length fields can help detect exploitation attempts. Operators should consider isolating UPF instances in segmented network zones with limited exposure to external networks. Applying runtime protections such as heap overflow detection and process monitoring can enable rapid detection and recovery from crashes. Coordination with free5GC maintainers and timely application of patches once available is critical. Additionally, operators should prepare incident response plans to quickly restore UPF functionality and minimize service disruption. Engaging with national cybersecurity agencies for threat intelligence sharing and support is recommended. Finally, reviewing and hardening all 5G core components against similar input validation issues will improve overall resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f5286c9e1ff5ad84a5d35

Added to database: 2/13/2026, 4:34:14 PM

Last enriched: 2/13/2026, 4:49:00 PM

Last updated: 2/13/2026, 6:18:55 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats