Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25501: CWE-476: NULL Pointer Dereference in free5gc smf

0
Medium
VulnerabilityCVE-2026-25501cvecve-2026-25501cwe-476
Published: Tue Feb 24 2026 (02/24/2026, 00:10:10 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: smf

Description

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics due to nil pointer dereference and the SMF process terminates. This is triggered by a malformed PFCP SessionReportRequest on the SMF PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:39:37 UTC

Technical Analysis

CVE-2026-25501 is a vulnerability in the free5GC open-source 5G core network project, specifically in its Session Management Function (SMF) component up to version 1.4.1. The issue is a NULL pointer dereference (CWE-476) caused by processing a malformed PFCP SessionReportRequest message received on the SMF's PFCP interface, which listens on UDP port 8805. PFCP (Packet Forwarding Control Protocol) is used between the SMF and User Plane Function (UPF) to manage session state and forwarding rules. When the SMF receives a malformed SessionReportRequest, it attempts to dereference a nil pointer, causing the SMF process to panic and terminate unexpectedly. This results in a denial of service (DoS) condition, disrupting session management in the 5G core network. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited remotely by sending crafted PFCP messages. No official upstream patch is currently available, but mitigations include network-level access control lists (ACLs) or firewalls to restrict PFCP interface access to trusted UPF IP addresses, dropping or inspecting malformed PFCP messages at the network edge, and adding recovery code (e.g., Go's recover() function) around the PFCP handler dispatch to prevent the entire SMF process from crashing. The CVSS 4.0 base score is 6.6, reflecting medium severity due to the impact on availability and ease of remote exploitation without authentication. This vulnerability highlights the risks in open-source 5G core components and the importance of robust input validation and fault tolerance in critical telecom infrastructure.

Potential Impact

The primary impact of CVE-2026-25501 is a denial of service condition affecting the SMF component of the free5GC 5G core network. The SMF is responsible for session management, including establishing and maintaining user sessions and forwarding rules between the control and user planes. If the SMF process terminates unexpectedly, it can disrupt ongoing sessions, degrade network performance, and potentially cause service outages for mobile subscribers. This can affect mobile network operators relying on free5GC or similar open-source 5G core implementations, leading to customer dissatisfaction, revenue loss, and reputational damage. Additionally, the vulnerability could be exploited by attackers to cause targeted disruptions or as part of a larger attack chain against 5G infrastructure. Since the vulnerability can be triggered remotely without authentication, it increases the attack surface. However, the lack of known exploits in the wild and the requirement to send malformed PFCP messages somewhat limit immediate widespread exploitation. Still, the critical role of SMF in 5G networks means that even temporary outages can have significant operational impacts.

Mitigation Recommendations

To mitigate CVE-2026-25501, organizations should implement the following specific measures: 1) Restrict access to the SMF PFCP interface (UDP port 8805) using network ACLs or firewalls to allow only trusted UPF IP addresses, minimizing exposure to spoofed or malicious PFCP messages. 2) Deploy deep packet inspection or protocol-aware filtering at the network edge to detect and drop malformed PFCP SessionReportRequest messages before they reach the SMF. 3) Modify the free5GC SMF codebase to add recovery mechanisms (e.g., Go's recover() function) around the PFCP handler dispatch to prevent the entire SMF process from crashing due to nil pointer dereferences. 4) Monitor SMF logs and network traffic for unusual PFCP message patterns or frequent process crashes indicative of exploitation attempts. 5) Engage with the free5GC community and vendors for updates or patches addressing this vulnerability and plan timely upgrades once fixes are available. 6) Consider deploying redundant SMF instances and failover mechanisms to maintain service continuity in case of process termination. These targeted mitigations go beyond generic advice by focusing on protocol-specific controls and code-level resilience.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.485Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604d8

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 3/3/2026, 8:39:37 PM

Last updated: 4/9/2026, 10:03:18 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses