Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1684: Denial of Service in Free5GC SMF

0
Medium
VulnerabilityCVE-2026-1684cvecve-2026-1684
Published: Fri Jan 30 2026 (01/30/2026, 14:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Free5GC
Product: SMF

Description

A vulnerability was found in Free5GC SMF up to 4.1.0. Affected by this issue is the function HandleReports of the file /internal/context/pfcp_reports.go of the component PFCP UDP Endpoint. The manipulation results in denial of service. The attack can be executed remotely. It is advisable to implement a patch to correct this issue.

AI-Powered Analysis

AILast updated: 02/23/2026, 21:50:51 UTC

Technical Analysis

CVE-2026-1684 is a denial of service (DoS) vulnerability identified in the Free5GC Session Management Function (SMF) component, specifically affecting versions 4.0 and 4.1.0. The vulnerability resides in the HandleReports function of the PFCP UDP Endpoint, implemented in the /internal/context/pfcp_reports.go file. PFCP (Packet Forwarding Control Protocol) is a critical protocol used between the SMF and User Plane Function (UPF) in 5G core networks to manage session and forwarding rules. The vulnerability allows an attacker to send specially crafted PFCP reports to the SMF, causing it to malfunction and resulting in denial of service. This attack can be executed remotely over the network without requiring any authentication or user interaction, increasing its risk profile. The vulnerability does not impact confidentiality or integrity but affects availability by disrupting the SMF’s ability to process PFCP reports correctly. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and low impact on availability. No known exploits have been reported in the wild to date. Free5GC is an open-source 5G core network implementation widely used for research, development, and some production environments, making this vulnerability relevant to organizations deploying or testing 5G core networks with Free5GC SMF. The absence of a patch link suggests that remediation may require applying updates once available or implementing temporary network-level protections.

Potential Impact

The primary impact of CVE-2026-1684 is the disruption of the 5G core network’s Session Management Function, which is responsible for session establishment, modification, and release. A successful denial of service attack can degrade or halt 5G service availability, affecting end-user connectivity and potentially causing cascading failures in dependent network functions. For telecommunications providers and enterprises relying on Free5GC SMF, this can lead to service outages, customer dissatisfaction, and financial losses. Given the critical role of 5G networks in supporting IoT, critical infrastructure, and enterprise applications, prolonged or widespread DoS could have broader economic and operational consequences. Although no confidentiality or integrity impact is noted, availability degradation in core network components is a significant risk. The remote and unauthenticated nature of the exploit increases the threat surface, especially in environments where the SMF PFCP endpoint is exposed or insufficiently protected. However, the lack of known exploits in the wild and the medium severity rating suggest the threat is moderate but warrants timely mitigation.

Mitigation Recommendations

Organizations should monitor Free5GC project updates and apply security patches promptly once available to address CVE-2026-1684. In the interim, network administrators should restrict access to the PFCP UDP endpoint of the SMF by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. Deploying intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous PFCP traffic patterns can help identify and block exploitation attempts. Additionally, logging and monitoring PFCP traffic for unusual report patterns can provide early warning of attack attempts. Network operators should also consider rate limiting PFCP messages to reduce the risk of DoS from flooding attacks. Conducting regular security assessments and penetration testing on 5G core components can help identify similar vulnerabilities proactively. Finally, organizations should maintain an incident response plan tailored to 5G core network disruptions to minimize downtime and service impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-30T07:35:57.699Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697cc6ebac063202225ecfa4

Added to database: 1/30/2026, 2:57:47 PM

Last enriched: 2/23/2026, 9:50:51 PM

Last updated: 3/17/2026, 9:46:31 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses