Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1973: NULL Pointer Dereference in Free5GC

0
Medium
VulnerabilityCVE-2026-1973cvecve-2026-1973
Published: Fri Feb 06 2026 (02/06/2026, 01:32:08 UTC)
Source: CVE Database V5
Product: Free5GC

Description

CVE-2026-1973 is a medium-severity vulnerability in Free5GC versions up to 4. 1. 0 affecting the SMF component's establishPfcpSession function. It allows a remote attacker to cause a null pointer dereference, potentially leading to a denial of service. No authentication or user interaction is required, and the attack can be launched over the network. Although no known exploits are currently observed in the wild, the vulnerability has been publicly disclosed. The CVSS score is 6. 9, reflecting moderate impact and ease of exploitation. European telecom operators and service providers using Free5GC could experience service disruptions if exploited. Applying vendor patches or updates is the primary mitigation.

AI-Powered Analysis

AILast updated: 02/06/2026, 02:29:51 UTC

Technical Analysis

CVE-2026-1973 is a vulnerability identified in Free5GC, an open-source 5G core network implementation widely used for research and some commercial deployments. The flaw resides in the SMF (Session Management Function) component, specifically within the establishPfcpSession function. This function is responsible for establishing PFCP (Packet Forwarding Control Protocol) sessions, which are critical for managing user plane traffic in 5G networks. The vulnerability is a null pointer dereference, which occurs when the function attempts to access or manipulate memory through a pointer that has not been properly initialized or has been set to null. This can cause the affected process to crash or behave unpredictably, resulting in a denial of service (DoS) condition. The vulnerability can be triggered remotely without any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality and integrity but low availability impact, consistent with a DoS scenario. Although no exploits are currently reported in the wild, the public disclosure increases the risk of exploitation attempts. The affected versions are Free5GC 4.0 and 4.1.0, and the issue has been fixed in later releases, though no direct patch links are provided in the source data.

Potential Impact

For European organizations, particularly telecom operators and infrastructure providers deploying Free5GC as part of their 5G core networks, this vulnerability poses a risk of service disruption. A successful exploitation could cause the SMF component to crash, leading to interruption of session management functions and degradation or outage of 5G user plane traffic. This can impact end-user connectivity, degrade quality of service, and potentially affect critical services relying on 5G networks. Given the increasing reliance on 5G for industrial automation, smart cities, and emergency services in Europe, such disruptions could have broader socioeconomic consequences. Although the vulnerability does not directly compromise data confidentiality or integrity, the availability impact alone is significant for network operators. The risk is heightened in countries with advanced 5G rollouts and where Free5GC or similar open-source 5G core solutions are in use.

Mitigation Recommendations

European organizations should prioritize upgrading Free5GC to versions beyond 4.1.0 where this vulnerability is resolved. In the absence of immediate patches, network operators should implement network-level protections such as filtering and rate limiting PFCP traffic to the SMF component to reduce exposure. Deploying intrusion detection systems (IDS) tuned to detect anomalous PFCP session establishment attempts can help identify exploitation attempts early. Network segmentation and strict access controls should be enforced to limit exposure of the SMF to untrusted networks. Regular monitoring of system logs and crash reports can aid in early detection of exploitation attempts. Additionally, organizations should engage with Free5GC community and vendors for timely updates and security advisories. Testing updates in controlled environments before production deployment is recommended to ensure stability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T13:33:39.834Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69854eadf9fa50a62f861449

Added to database: 2/6/2026, 2:15:09 AM

Last enriched: 2/6/2026, 2:29:51 AM

Last updated: 2/6/2026, 3:19:45 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats