CVE-2026-26025: CWE-476: NULL Pointer Dereference in free5gc smf
free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).
AI Analysis
Technical Summary
CVE-2026-26025 identifies a NULL pointer dereference vulnerability (CWE-476) in the Session Management Function (SMF) of free5GC, an open-source 5G core network project. The SMF component handles session management and communicates with User Plane Functions (UPFs) via the PFCP protocol over UDP port 8805. In versions up to and including 1.4.1, when the SMF receives a malformed PFCP SessionReportRequest message, it dereferences a NULL pointer, causing the SMF process to panic and terminate. This results in a denial-of-service (DoS) condition, disrupting the 5G core network's session management capabilities. The vulnerability can be exploited remotely without authentication or user interaction, as the PFCP interface is exposed for communication with UPFs. No official upstream patch is currently available, but mitigations include network-level access control to restrict PFCP traffic to trusted UPF IP addresses, deploying network edge filters to drop or inspect malformed PFCP messages, and implementing application-level recovery mechanisms (e.g., adding recover() around PFCP handler dispatch) to prevent process termination. The CVSS 4.0 base score is 6.6 (medium severity), reflecting the ease of exploitation and significant impact on availability but no impact on confidentiality or integrity. This vulnerability poses a risk to operators using free5GC SMF in production 5G networks, potentially causing service disruptions and impacting subscriber connectivity.
Potential Impact
The primary impact of CVE-2026-26025 is a denial-of-service condition on the free5GC SMF component, which is critical for managing 5G session states. An attacker sending malformed PFCP SessionReportRequest messages can cause the SMF process to crash, leading to session management failures and potential service outages for subscribers relying on the affected 5G core network. This disruption can degrade network availability and reliability, affecting end-user experience and potentially causing revenue loss for mobile network operators. Since SMF is a core network function, its failure can cascade, impacting other 5G core components and services dependent on session continuity. The vulnerability does not expose subscriber data or allow privilege escalation, but the availability impact is significant in a production environment. Organizations relying on free5GC SMF without mitigations are at risk of targeted or opportunistic DoS attacks, especially if the PFCP interface is exposed to untrusted networks or IP addresses.
Mitigation Recommendations
1. Implement strict Access Control Lists (ACLs) or firewall rules to restrict PFCP (UDP/8805) interface access exclusively to trusted and authenticated UPF IP addresses, minimizing exposure to spoofed or malicious traffic. 2. Deploy deep packet inspection or protocol-aware filtering at the network edge to detect and drop malformed PFCP SessionReportRequest messages before they reach the SMF, reducing attack surface. 3. Apply application-level mitigations by modifying the free5GC SMF code to include recover() or equivalent exception handling around PFCP handler dispatch routines to prevent the entire process from terminating upon encountering malformed messages. 4. Monitor SMF process health and PFCP traffic patterns to detect anomalies indicative of exploitation attempts. 5. Plan for timely updates and patches once an official fix is released by the free5GC project. 6. Consider network segmentation to isolate the PFCP interface from broader network access, limiting potential attack vectors. 7. Conduct regular security assessments and penetration testing focused on PFCP protocol handling to identify and remediate similar vulnerabilities proactively.
Affected Countries
United States, China, South Korea, Japan, Germany, United Kingdom, France, India, Brazil, Canada, Australia, Italy, Spain, Netherlands
CVE-2026-26025: CWE-476: NULL Pointer Dereference in free5gc smf
Description
free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26025 identifies a NULL pointer dereference vulnerability (CWE-476) in the Session Management Function (SMF) of free5GC, an open-source 5G core network project. The SMF component handles session management and communicates with User Plane Functions (UPFs) via the PFCP protocol over UDP port 8805. In versions up to and including 1.4.1, when the SMF receives a malformed PFCP SessionReportRequest message, it dereferences a NULL pointer, causing the SMF process to panic and terminate. This results in a denial-of-service (DoS) condition, disrupting the 5G core network's session management capabilities. The vulnerability can be exploited remotely without authentication or user interaction, as the PFCP interface is exposed for communication with UPFs. No official upstream patch is currently available, but mitigations include network-level access control to restrict PFCP traffic to trusted UPF IP addresses, deploying network edge filters to drop or inspect malformed PFCP messages, and implementing application-level recovery mechanisms (e.g., adding recover() around PFCP handler dispatch) to prevent process termination. The CVSS 4.0 base score is 6.6 (medium severity), reflecting the ease of exploitation and significant impact on availability but no impact on confidentiality or integrity. This vulnerability poses a risk to operators using free5GC SMF in production 5G networks, potentially causing service disruptions and impacting subscriber connectivity.
Potential Impact
The primary impact of CVE-2026-26025 is a denial-of-service condition on the free5GC SMF component, which is critical for managing 5G session states. An attacker sending malformed PFCP SessionReportRequest messages can cause the SMF process to crash, leading to session management failures and potential service outages for subscribers relying on the affected 5G core network. This disruption can degrade network availability and reliability, affecting end-user experience and potentially causing revenue loss for mobile network operators. Since SMF is a core network function, its failure can cascade, impacting other 5G core components and services dependent on session continuity. The vulnerability does not expose subscriber data or allow privilege escalation, but the availability impact is significant in a production environment. Organizations relying on free5GC SMF without mitigations are at risk of targeted or opportunistic DoS attacks, especially if the PFCP interface is exposed to untrusted networks or IP addresses.
Mitigation Recommendations
1. Implement strict Access Control Lists (ACLs) or firewall rules to restrict PFCP (UDP/8805) interface access exclusively to trusted and authenticated UPF IP addresses, minimizing exposure to spoofed or malicious traffic. 2. Deploy deep packet inspection or protocol-aware filtering at the network edge to detect and drop malformed PFCP SessionReportRequest messages before they reach the SMF, reducing attack surface. 3. Apply application-level mitigations by modifying the free5GC SMF code to include recover() or equivalent exception handling around PFCP handler dispatch routines to prevent the entire process from terminating upon encountering malformed messages. 4. Monitor SMF process health and PFCP traffic patterns to detect anomalies indicative of exploitation attempts. 5. Plan for timely updates and patches once an official fix is released by the free5GC project. 6. Consider network segmentation to isolate the PFCP interface from broader network access, limiting potential attack vectors. 7. Conduct regular security assessments and penetration testing focused on PFCP protocol handling to identify and remediate similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T21:36:29.555Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699cf533be58cf853bf604e5
Added to database: 2/24/2026, 12:47:47 AM
Last enriched: 3/3/2026, 8:40:13 PM
Last updated: 4/10/2026, 7:54:27 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.