CVE-2026-2525: Denial of Service in Free5GC
A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the component PFCP UDP Endpoint. Such manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2026-2525 identifies a denial of service vulnerability in Free5GC, an open-source 5G core network software, affecting versions 4.0 and 4.1.0. The vulnerability resides in the PFCP (Packet Forwarding Control Protocol) UDP Endpoint component, which is responsible for control plane communication between the control and user plane functions in 5G core networks. An attacker can remotely send specially crafted UDP packets to this endpoint, triggering a condition that causes the service to become unavailable or crash, resulting in denial of service. The attack does not require any authentication or user interaction, making it easier to exploit remotely. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity due to its impact on availability and ease of exploitation. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the risk of exploitation attempts. Free5GC is increasingly used by telecom operators and vendors to build 5G core networks, making this vulnerability relevant to critical telecommunications infrastructure. The lack of patches or official fixes at the time of disclosure necessitates interim mitigations such as network filtering and traffic monitoring. The vulnerability could disrupt 5G core network operations, impacting services relying on 5G connectivity.
Potential Impact
For European organizations, particularly telecom operators and service providers deploying Free5GC as part of their 5G core infrastructure, this vulnerability poses a risk of network service disruption. A successful denial of service attack could lead to outages in 5G network functions, affecting mobile broadband, IoT connectivity, and critical communications services. This could degrade user experience, interrupt business operations relying on 5G, and potentially impact emergency services or industrial applications dependent on 5G networks. The remote and unauthenticated nature of the attack increases the risk of exploitation by malicious actors, including cybercriminals or state-sponsored groups targeting telecommunications infrastructure. Given Europe's strategic push for advanced 5G deployments and digital transformation, such disruptions could have broader economic and security implications. Additionally, the open-source nature of Free5GC means that multiple vendors and operators might be affected simultaneously if patches are not applied promptly.
Mitigation Recommendations
1. Monitor official Free5GC repositories and security advisories closely for patches addressing CVE-2026-2525 and apply updates promptly once available. 2. Implement network-level filtering to restrict incoming UDP traffic to the PFCP port (typically UDP port 8805) to trusted sources only, reducing exposure to external attackers. 3. Deploy intrusion detection and prevention systems (IDS/IPS) capable of detecting anomalous or malformed PFCP packets to block potential exploit attempts. 4. Segment the 5G core network components to limit lateral movement and isolate critical functions from untrusted networks. 5. Conduct regular security assessments and penetration testing focused on 5G core components to identify and remediate vulnerabilities proactively. 6. Collaborate with vendors and open-source communities to share threat intelligence and coordinate response efforts. 7. Prepare incident response plans specific to 5G core network disruptions to minimize downtime and service impact.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2026-2525: Denial of Service in Free5GC
Description
A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the component PFCP UDP Endpoint. Such manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-2525 identifies a denial of service vulnerability in Free5GC, an open-source 5G core network software, affecting versions 4.0 and 4.1.0. The vulnerability resides in the PFCP (Packet Forwarding Control Protocol) UDP Endpoint component, which is responsible for control plane communication between the control and user plane functions in 5G core networks. An attacker can remotely send specially crafted UDP packets to this endpoint, triggering a condition that causes the service to become unavailable or crash, resulting in denial of service. The attack does not require any authentication or user interaction, making it easier to exploit remotely. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity due to its impact on availability and ease of exploitation. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the risk of exploitation attempts. Free5GC is increasingly used by telecom operators and vendors to build 5G core networks, making this vulnerability relevant to critical telecommunications infrastructure. The lack of patches or official fixes at the time of disclosure necessitates interim mitigations such as network filtering and traffic monitoring. The vulnerability could disrupt 5G core network operations, impacting services relying on 5G connectivity.
Potential Impact
For European organizations, particularly telecom operators and service providers deploying Free5GC as part of their 5G core infrastructure, this vulnerability poses a risk of network service disruption. A successful denial of service attack could lead to outages in 5G network functions, affecting mobile broadband, IoT connectivity, and critical communications services. This could degrade user experience, interrupt business operations relying on 5G, and potentially impact emergency services or industrial applications dependent on 5G networks. The remote and unauthenticated nature of the attack increases the risk of exploitation by malicious actors, including cybercriminals or state-sponsored groups targeting telecommunications infrastructure. Given Europe's strategic push for advanced 5G deployments and digital transformation, such disruptions could have broader economic and security implications. Additionally, the open-source nature of Free5GC means that multiple vendors and operators might be affected simultaneously if patches are not applied promptly.
Mitigation Recommendations
1. Monitor official Free5GC repositories and security advisories closely for patches addressing CVE-2026-2525 and apply updates promptly once available. 2. Implement network-level filtering to restrict incoming UDP traffic to the PFCP port (typically UDP port 8805) to trusted sources only, reducing exposure to external attackers. 3. Deploy intrusion detection and prevention systems (IDS/IPS) capable of detecting anomalous or malformed PFCP packets to block potential exploit attempts. 4. Segment the 5G core network components to limit lateral movement and isolate critical functions from untrusted networks. 5. Conduct regular security assessments and penetration testing focused on 5G core components to identify and remediate vulnerabilities proactively. 6. Collaborate with vendors and open-source communities to share threat intelligence and coordinate response efforts. 7. Prepare incident response plans specific to 5G core network disruptions to minimize downtime and service impact.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-15T08:45:10.248Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69927413bda29fb02f0e118c
Added to database: 2/16/2026, 1:34:11 AM
Last enriched: 2/16/2026, 1:48:39 AM
Last updated: 2/21/2026, 12:04:57 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.