Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26025: CWE-476: NULL Pointer Dereference in free5gc smf

0
Medium
VulnerabilityCVE-2026-26025cvecve-2026-26025cwe-476
Published: Tue Feb 24 2026 (02/24/2026, 00:15:59 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: smf

Description

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:40:13 UTC

Technical Analysis

CVE-2026-26025 identifies a NULL pointer dereference vulnerability (CWE-476) in the Session Management Function (SMF) of free5GC, an open-source 5G core network project. The SMF component handles session management and communicates with User Plane Functions (UPFs) via the PFCP protocol over UDP port 8805. In versions up to and including 1.4.1, when the SMF receives a malformed PFCP SessionReportRequest message, it dereferences a NULL pointer, causing the SMF process to panic and terminate. This results in a denial-of-service (DoS) condition, disrupting the 5G core network's session management capabilities. The vulnerability can be exploited remotely without authentication or user interaction, as the PFCP interface is exposed for communication with UPFs. No official upstream patch is currently available, but mitigations include network-level access control to restrict PFCP traffic to trusted UPF IP addresses, deploying network edge filters to drop or inspect malformed PFCP messages, and implementing application-level recovery mechanisms (e.g., adding recover() around PFCP handler dispatch) to prevent process termination. The CVSS 4.0 base score is 6.6 (medium severity), reflecting the ease of exploitation and significant impact on availability but no impact on confidentiality or integrity. This vulnerability poses a risk to operators using free5GC SMF in production 5G networks, potentially causing service disruptions and impacting subscriber connectivity.

Potential Impact

The primary impact of CVE-2026-26025 is a denial-of-service condition on the free5GC SMF component, which is critical for managing 5G session states. An attacker sending malformed PFCP SessionReportRequest messages can cause the SMF process to crash, leading to session management failures and potential service outages for subscribers relying on the affected 5G core network. This disruption can degrade network availability and reliability, affecting end-user experience and potentially causing revenue loss for mobile network operators. Since SMF is a core network function, its failure can cascade, impacting other 5G core components and services dependent on session continuity. The vulnerability does not expose subscriber data or allow privilege escalation, but the availability impact is significant in a production environment. Organizations relying on free5GC SMF without mitigations are at risk of targeted or opportunistic DoS attacks, especially if the PFCP interface is exposed to untrusted networks or IP addresses.

Mitigation Recommendations

1. Implement strict Access Control Lists (ACLs) or firewall rules to restrict PFCP (UDP/8805) interface access exclusively to trusted and authenticated UPF IP addresses, minimizing exposure to spoofed or malicious traffic. 2. Deploy deep packet inspection or protocol-aware filtering at the network edge to detect and drop malformed PFCP SessionReportRequest messages before they reach the SMF, reducing attack surface. 3. Apply application-level mitigations by modifying the free5GC SMF code to include recover() or equivalent exception handling around PFCP handler dispatch routines to prevent the entire process from terminating upon encountering malformed messages. 4. Monitor SMF process health and PFCP traffic patterns to detect anomalies indicative of exploitation attempts. 5. Plan for timely updates and patches once an official fix is released by the free5GC project. 6. Consider network segmentation to isolate the PFCP interface from broader network access, limiting potential attack vectors. 7. Conduct regular security assessments and penetration testing focused on PFCP protocol handling to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T21:36:29.555Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604e5

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 3/3/2026, 8:40:13 PM

Last updated: 4/10/2026, 7:54:27 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses