Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2525: Denial of Service in Free5GC

0
Medium
VulnerabilityCVE-2026-2525cvecve-2026-2525
Published: Mon Feb 16 2026 (02/16/2026, 01:02:06 UTC)
Source: CVE Database V5
Product: Free5GC

Description

A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the component PFCP UDP Endpoint. Such manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 02/16/2026, 01:48:39 UTC

Technical Analysis

CVE-2026-2525 identifies a denial of service vulnerability in Free5GC, an open-source 5G core network software, affecting versions 4.0 and 4.1.0. The vulnerability resides in the PFCP (Packet Forwarding Control Protocol) UDP Endpoint component, which is responsible for control plane communication between the control and user plane functions in 5G core networks. An attacker can remotely send specially crafted UDP packets to this endpoint, triggering a condition that causes the service to become unavailable or crash, resulting in denial of service. The attack does not require any authentication or user interaction, making it easier to exploit remotely. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity due to its impact on availability and ease of exploitation. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the risk of exploitation attempts. Free5GC is increasingly used by telecom operators and vendors to build 5G core networks, making this vulnerability relevant to critical telecommunications infrastructure. The lack of patches or official fixes at the time of disclosure necessitates interim mitigations such as network filtering and traffic monitoring. The vulnerability could disrupt 5G core network operations, impacting services relying on 5G connectivity.

Potential Impact

For European organizations, particularly telecom operators and service providers deploying Free5GC as part of their 5G core infrastructure, this vulnerability poses a risk of network service disruption. A successful denial of service attack could lead to outages in 5G network functions, affecting mobile broadband, IoT connectivity, and critical communications services. This could degrade user experience, interrupt business operations relying on 5G, and potentially impact emergency services or industrial applications dependent on 5G networks. The remote and unauthenticated nature of the attack increases the risk of exploitation by malicious actors, including cybercriminals or state-sponsored groups targeting telecommunications infrastructure. Given Europe's strategic push for advanced 5G deployments and digital transformation, such disruptions could have broader economic and security implications. Additionally, the open-source nature of Free5GC means that multiple vendors and operators might be affected simultaneously if patches are not applied promptly.

Mitigation Recommendations

1. Monitor official Free5GC repositories and security advisories closely for patches addressing CVE-2026-2525 and apply updates promptly once available. 2. Implement network-level filtering to restrict incoming UDP traffic to the PFCP port (typically UDP port 8805) to trusted sources only, reducing exposure to external attackers. 3. Deploy intrusion detection and prevention systems (IDS/IPS) capable of detecting anomalous or malformed PFCP packets to block potential exploit attempts. 4. Segment the 5G core network components to limit lateral movement and isolate critical functions from untrusted networks. 5. Conduct regular security assessments and penetration testing focused on 5G core components to identify and remediate vulnerabilities proactively. 6. Collaborate with vendors and open-source communities to share threat intelligence and coordinate response efforts. 7. Prepare incident response plans specific to 5G core network disruptions to minimize downtime and service impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T08:45:10.248Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69927413bda29fb02f0e118c

Added to database: 2/16/2026, 1:34:11 AM

Last enriched: 2/16/2026, 1:48:39 AM

Last updated: 2/21/2026, 12:04:57 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats