Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1684: Denial of Service in Free5GC SMF

0
Medium
VulnerabilityCVE-2026-1684cvecve-2026-1684
Published: Fri Jan 30 2026 (01/30/2026, 14:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Free5GC
Product: SMF

Description

A vulnerability was found in Free5GC SMF up to 4.1.0. Affected by this issue is the function HandleReports of the file /internal/context/pfcp_reports.go of the component PFCP UDP Endpoint. The manipulation results in denial of service. The attack can be executed remotely. It is advisable to implement a patch to correct this issue.

AI-Powered Analysis

AILast updated: 01/30/2026, 15:12:19 UTC

Technical Analysis

CVE-2026-1684 identifies a denial of service (DoS) vulnerability in the Free5GC Session Management Function (SMF) component, specifically affecting versions 4.0 and 4.1.0. The vulnerability resides in the HandleReports function of the PFCP UDP Endpoint, located in the /internal/context/pfcp_reports.go source file. PFCP (Packet Forwarding Control Protocol) is critical for control plane communication between the SMF and User Plane Function (UPF) in 5G core networks. The issue arises from improper handling or validation of PFCP reports, which an attacker can manipulate remotely without authentication or user interaction. This manipulation can cause the SMF process to crash or become unresponsive, resulting in denial of service. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on availability. No known exploits have been reported yet, but the vulnerability poses a risk to the availability of 5G core network services that depend on Free5GC SMF. Since Free5GC is an open-source 5G core implementation, it is used in research, testing, and some production environments, making this vulnerability relevant for operators and vendors deploying Free5GC-based infrastructures.

Potential Impact

For European organizations, especially telecom operators and network service providers deploying Free5GC SMF in their 5G core networks, this vulnerability could lead to service disruptions. A successful DoS attack could cause session management failures, impacting subscriber connectivity, session establishment, and mobility management. This may result in degraded user experience, loss of revenue, and potential regulatory non-compliance due to service outages. Critical infrastructure relying on 5G connectivity, such as smart grids, transportation, and emergency services, could also be indirectly affected. The remote and unauthenticated nature of the attack increases the risk, as threat actors could exploit this vulnerability from outside the network perimeter. Although no exploits are currently known, the medium severity score and the essential role of SMF in 5G core networks necessitate proactive mitigation to prevent potential disruptions.

Mitigation Recommendations

European organizations should immediately assess their Free5GC SMF deployments and upgrade to a patched version once available from the Free5GC project. In the absence of an official patch, organizations can implement network-level protections such as filtering and rate-limiting PFCP traffic to mitigate potential exploitation attempts. Deploying anomaly detection systems to monitor unusual PFCP message patterns can help identify exploitation attempts early. Isolating the SMF component within segmented network zones and restricting PFCP UDP port access to trusted network elements reduces exposure. Regularly auditing and updating 5G core network components, including open-source projects like Free5GC, is critical. Additionally, organizations should engage with Free5GC community channels to track patch releases and vulnerability disclosures. Incident response plans should be updated to include scenarios involving SMF DoS attacks to ensure rapid recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-30T07:35:57.699Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697cc6ebac063202225ecfa4

Added to database: 1/30/2026, 2:57:47 PM

Last enriched: 1/30/2026, 3:12:19 PM

Last updated: 1/31/2026, 6:03:02 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats