CVE-2026-1739: NULL Pointer Dereference in Free5GC pcf
A vulnerability has been found in Free5GC pcf up to 1.4.1. This affects the function HandleCreateSmPolicyRequest of the file internal/sbi/processor/smpolicy.go. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is df535f5524314620715e842baf9723efbeb481a7. Applying a patch is the recommended action to fix this issue.
AI Analysis
Technical Summary
CVE-2026-1739 is a vulnerability identified in the Free5GC open-source 5G core network implementation, specifically affecting the Policy Control Function (pcf) component in versions 1.4.0 and 1.4.1. The flaw exists in the HandleCreateSmPolicyRequest function within the internal/sbi/processor/smpolicy.go source file, where improper handling of input leads to a null pointer dereference. This results in the pcf process crashing, causing a denial of service (DoS) condition. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the pcf service interface. The CVSS v4.0 score is 6.9, reflecting a medium severity level due to the impact on availability and ease of exploitation. The vulnerability does not affect confidentiality or integrity directly but can disrupt 5G policy control operations, which are critical for managing network slices, QoS, and subscriber policies. The patch identified by commit df535f5524314620715e842baf9723efbeb481a7 addresses the null pointer dereference by adding proper input validation and error handling. While no active exploits have been reported in the wild, the public disclosure of the exploit code increases the risk of opportunistic attacks. Given the central role of pcf in 5G core networks, exploitation could lead to service interruptions affecting end-users and enterprise customers relying on 5G connectivity.
Potential Impact
For European organizations, especially telecom operators and service providers deploying Free5GC as part of their 5G core infrastructure, this vulnerability poses a risk of service disruption. A successful exploit can crash the pcf component, leading to denial of service in policy control functions, which manage subscriber policies, QoS, and network slicing. This disruption can degrade network performance, cause dropped connections, or prevent new sessions from being established, impacting both consumer and critical infrastructure services. Enterprises relying on 5G for IoT, industrial automation, or emergency services may experience operational interruptions. Additionally, the vulnerability could be leveraged as part of a broader attack chain to degrade network reliability or as a distraction while other attacks are conducted. The medium severity rating reflects that while the vulnerability does not allow data theft or privilege escalation, the availability impact on critical telecom infrastructure is significant. European regulators and operators must consider the potential cascading effects on dependent services and comply with network resilience requirements.
Mitigation Recommendations
The primary mitigation is to apply the official patch identified by commit df535f5524314620715e842baf9723efbeb481a7 to Free5GC pcf versions 1.4.0 and 1.4.1 immediately. Operators should verify the integrity and successful deployment of the patch in their environments. Additional mitigations include: 1) Implementing network segmentation and strict access controls to limit exposure of the pcf service interface to trusted management networks only. 2) Deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection rules to identify malformed or suspicious requests targeting the HandleCreateSmPolicyRequest function. 3) Monitoring pcf service logs and system health metrics for signs of crashes or unusual activity indicative of exploitation attempts. 4) Establishing incident response procedures to quickly isolate and recover affected components. 5) Conducting regular security assessments and penetration testing on 5G core components to identify and remediate vulnerabilities proactively. 6) Collaborating with Free5GC community and vendors for timely updates and threat intelligence sharing.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2026-1739: NULL Pointer Dereference in Free5GC pcf
Description
A vulnerability has been found in Free5GC pcf up to 1.4.1. This affects the function HandleCreateSmPolicyRequest of the file internal/sbi/processor/smpolicy.go. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is df535f5524314620715e842baf9723efbeb481a7. Applying a patch is the recommended action to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-1739 is a vulnerability identified in the Free5GC open-source 5G core network implementation, specifically affecting the Policy Control Function (pcf) component in versions 1.4.0 and 1.4.1. The flaw exists in the HandleCreateSmPolicyRequest function within the internal/sbi/processor/smpolicy.go source file, where improper handling of input leads to a null pointer dereference. This results in the pcf process crashing, causing a denial of service (DoS) condition. The vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the pcf service interface. The CVSS v4.0 score is 6.9, reflecting a medium severity level due to the impact on availability and ease of exploitation. The vulnerability does not affect confidentiality or integrity directly but can disrupt 5G policy control operations, which are critical for managing network slices, QoS, and subscriber policies. The patch identified by commit df535f5524314620715e842baf9723efbeb481a7 addresses the null pointer dereference by adding proper input validation and error handling. While no active exploits have been reported in the wild, the public disclosure of the exploit code increases the risk of opportunistic attacks. Given the central role of pcf in 5G core networks, exploitation could lead to service interruptions affecting end-users and enterprise customers relying on 5G connectivity.
Potential Impact
For European organizations, especially telecom operators and service providers deploying Free5GC as part of their 5G core infrastructure, this vulnerability poses a risk of service disruption. A successful exploit can crash the pcf component, leading to denial of service in policy control functions, which manage subscriber policies, QoS, and network slicing. This disruption can degrade network performance, cause dropped connections, or prevent new sessions from being established, impacting both consumer and critical infrastructure services. Enterprises relying on 5G for IoT, industrial automation, or emergency services may experience operational interruptions. Additionally, the vulnerability could be leveraged as part of a broader attack chain to degrade network reliability or as a distraction while other attacks are conducted. The medium severity rating reflects that while the vulnerability does not allow data theft or privilege escalation, the availability impact on critical telecom infrastructure is significant. European regulators and operators must consider the potential cascading effects on dependent services and comply with network resilience requirements.
Mitigation Recommendations
The primary mitigation is to apply the official patch identified by commit df535f5524314620715e842baf9723efbeb481a7 to Free5GC pcf versions 1.4.0 and 1.4.1 immediately. Operators should verify the integrity and successful deployment of the patch in their environments. Additional mitigations include: 1) Implementing network segmentation and strict access controls to limit exposure of the pcf service interface to trusted management networks only. 2) Deploying intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection rules to identify malformed or suspicious requests targeting the HandleCreateSmPolicyRequest function. 3) Monitoring pcf service logs and system health metrics for signs of crashes or unusual activity indicative of exploitation attempts. 4) Establishing incident response procedures to quickly isolate and recover affected components. 5) Conducting regular security assessments and penetration testing on 5G core components to identify and remediate vulnerabilities proactively. 6) Collaborating with Free5GC community and vendors for timely updates and threat intelligence sharing.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-01T07:50:20.426Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69800820ac063202227a882f
Added to database: 2/2/2026, 2:12:48 AM
Last enriched: 2/2/2026, 2:27:29 AM
Last updated: 2/7/2026, 3:17:35 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.