Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1974: Denial of Service in Free5GC

0
Medium
VulnerabilityCVE-2026-1974cvecve-2026-1974
Published: Fri Feb 06 2026 (02/06/2026, 02:02:10 UTC)
Source: CVE Database V5
Product: Free5GC

Description

A vulnerability was identified in Free5GC up to 4.1.0. This affects the function ResolveNodeIdToIp of the file internal/sbi/processor/datapath.go of the component SMF. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:02:29 UTC

Technical Analysis

CVE-2026-1974 identifies a denial of service vulnerability in Free5GC, an open-source 5G core network platform widely used for 5G network function virtualization and testing. The vulnerability is located in the SMF (Session Management Function) component, specifically in the ResolveNodeIdToIp function within the internal/sbi/processor/datapath.go file. This function is responsible for resolving node identifiers to IP addresses, a critical step in routing and managing 5G network sessions. Improper handling or manipulation of inputs to this function can trigger a denial of service condition, causing the SMF to crash or become unresponsive, thereby disrupting session management and potentially impacting the entire 5G core network's availability. The vulnerability can be exploited remotely over the network without the need for authentication or user interaction, increasing the attack surface. The CVSS v4.0 score of 6.9 reflects a medium severity, primarily due to the impact on availability and ease of exploitation. Although no active exploitation has been reported, a public exploit is available, which could facilitate attacks by malicious actors. Free5GC versions 4.0 and 4.1.0 are confirmed affected, and users are advised to apply patches or updates once available. This vulnerability highlights the risks associated with open-source 5G core implementations and the importance of rigorous input validation and error handling in critical telecom infrastructure components.

Potential Impact

The primary impact of CVE-2026-1974 is the disruption of 5G core network services due to denial of service in the SMF component. This can lead to session management failures, dropped connections, and degraded network performance, affecting end-user experience and potentially causing outages in 5G services. For telecom operators and enterprises relying on Free5GC for 5G core functions, this vulnerability could result in service downtime, loss of revenue, and damage to reputation. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where Free5GC is exposed to untrusted networks. Additionally, disruption in 5G core functions could impact critical services that depend on 5G connectivity, including IoT deployments, emergency communications, and industrial automation. While no known active exploitation is reported, the availability of a public exploit lowers the barrier for attackers to launch DoS attacks, potentially leading to targeted or opportunistic disruptions. Organizations worldwide deploying Free5GC or similar open-source 5G core solutions must consider the operational and security implications of this vulnerability.

Mitigation Recommendations

To mitigate CVE-2026-1974, organizations should promptly apply the official patches or updates released by the Free5GC maintainers addressing the ResolveNodeIdToIp function vulnerability. In the absence of an immediate patch, network administrators should implement strict network segmentation and firewall rules to restrict access to the SMF interfaces, limiting exposure to untrusted networks. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous or malformed requests targeting the SMF can help identify and block exploitation attempts. Regularly monitoring SMF logs and system health metrics can provide early warning signs of attempted or successful DoS attacks. Additionally, organizations should conduct thorough input validation and fuzz testing on their 5G core components to identify and remediate similar vulnerabilities proactively. Employing redundancy and failover mechanisms for the SMF can reduce the impact of potential service disruptions. Finally, maintaining an up-to-date asset inventory and vulnerability management program focused on 5G infrastructure components will ensure timely detection and response to emerging threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T13:33:48.056Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69854eadf9fa50a62f861452

Added to database: 2/6/2026, 2:15:09 AM

Last enriched: 2/23/2026, 10:02:29 PM

Last updated: 3/23/2026, 7:57:09 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses