Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26024: CWE-476: NULL Pointer Dereference in free5gc smf

0
Medium
VulnerabilityCVE-2026-26024cvecve-2026-26024cwe-476
Published: Tue Feb 24 2026 (02/24/2026, 00:12:05 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: smf

Description

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:39:57 UTC

Technical Analysis

CVE-2026-26024 is a vulnerability classified as CWE-476 (NULL Pointer Dereference) found in the Session Management Function (SMF) of free5GC, an open-source 5G core network project. The SMF component handles session management and communicates over the PFCP protocol on UDP port 8805. In versions up to and including 1.4.1, the SMF improperly handles malformed PFCP SessionReportRequest messages, leading to a NULL pointer dereference. This causes the SMF process to panic and terminate unexpectedly, resulting in a denial of service condition. The vulnerability can be triggered remotely without authentication or user interaction, making it accessible to attackers who can send crafted PFCP messages to the SMF interface. No official upstream patch is available at the time of disclosure. Workarounds include restricting PFCP interface access to trusted User Plane Function (UPF) IP addresses using ACLs or firewalls to reduce spoofing and abuse potential. Additionally, network edge devices can be configured to drop or inspect malformed PFCP SessionReportRequest messages to prevent them from reaching the SMF. Another mitigation is to modify the SMF code to add recover() constructs around the PFCP handler dispatch to prevent the entire process from terminating upon encountering malformed packets. The CVSS v4.0 base score is 6.6 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and high impact on availability. This vulnerability poses a risk to the stability and availability of 5G core networks using free5GC SMF, potentially disrupting session management and impacting subscriber services.

Potential Impact

The primary impact of CVE-2026-26024 is a denial of service condition on the free5GC SMF component, which is critical for managing sessions in 5G core networks. An attacker who can send crafted PFCP SessionReportRequest messages can cause the SMF to crash, leading to service interruptions. This can degrade network reliability, cause dropped or failed sessions, and impact subscriber experience. In large-scale deployments, repeated exploitation could lead to widespread service outages or force failover to backup systems, increasing operational complexity and costs. Since the SMF is a core network function, its unavailability can affect multiple downstream network functions and services, potentially impacting emergency communications, IoT devices, and enterprise customers relying on 5G connectivity. The vulnerability does not directly expose sensitive data or allow code execution, but the availability impact is significant in the context of telecommunications infrastructure. Organizations using free5GC SMF must consider the risk of targeted attacks or accidental malformed traffic causing outages, especially in environments with less controlled network perimeters.

Mitigation Recommendations

To mitigate CVE-2026-26024, organizations should implement the following specific measures: 1) Restrict access to the PFCP interface (UDP port 8805) using ACLs or firewalls to allow only trusted User Plane Function (UPF) IP addresses. This reduces the attack surface by preventing unauthorized or spoofed PFCP messages from reaching the SMF. 2) Deploy network edge filtering or deep packet inspection to detect and drop malformed PFCP SessionReportRequest messages before they reach the SMF. This can be done using specialized network security appliances or custom filtering rules. 3) Modify the SMF codebase to add recover() or equivalent exception handling around the PFCP handler dispatch logic to prevent the entire SMF process from terminating on malformed input. This is a mitigation only until an official patch is released. 4) Monitor SMF logs and network traffic for unusual PFCP message patterns or repeated crashes to detect potential exploitation attempts early. 5) Plan for rapid incident response and failover mechanisms to maintain service continuity if the SMF becomes unavailable. 6) Stay updated with free5GC project releases and apply official patches promptly once available. These mitigations go beyond generic advice by focusing on network-level controls and code-level resilience specific to the PFCP interface and SMF behavior.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T21:36:29.555Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604e1

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 3/3/2026, 8:39:57 PM

Last updated: 4/10/2026, 12:19:56 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses