Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27642: CWE-20: Improper Input Validation in free5gc udm

0
Medium
VulnerabilityCVE-2026-27642cvecve-2026-27642cwe-20
Published: Tue Feb 24 2026 (02/24/2026, 00:18:56 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udm

Description

CVE-2026-27642 is a medium severity vulnerability in free5gc's Unified Data Management (UDM) component, versions up to 1. 4. 1. It allows remote attackers to inject control characters into the supi parameter, causing internal URL parsing errors that expose system-level error details. This can facilitate service fingerprinting by revealing implementation specifics. The vulnerability affects the Nudm_UEAU service and requires no authentication or user interaction to exploit. No direct application-level workaround exists, but an official patch is available in free5gc/udm pull request 75. Organizations using free5GC in their 5G core networks should prioritize patching to prevent information leakage and reconnaissance by attackers.

AI-Powered Analysis

AILast updated: 02/24/2026, 01:02:46 UTC

Technical Analysis

The vulnerability CVE-2026-27642 affects the Unified Data Management (UDM) component of free5gc, an open-source 5G core network project. Specifically, in versions up to and including 1.4.1, the UDM's Nudm_UEAU service improperly validates input in the supi parameter, allowing remote attackers to inject control characters such as %00 (null byte). This improper input validation triggers internal URL parsing errors within the net/url package, which does not accept control characters. These parsing errors cause the system to expose detailed error messages that reveal internal implementation details. Although this does not directly lead to code execution or data manipulation, the exposure of system-level error information can be leveraged by attackers for service fingerprinting and reconnaissance, aiding in crafting further attacks. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The issue is tracked under CWE-20 (Improper Input Validation). The free5gc project has addressed this vulnerability in pull request 75 for the udm component, but no direct workaround is available at the application level, emphasizing the need for patching.

Potential Impact

The primary impact of CVE-2026-27642 is information disclosure through detailed error messages caused by improper input validation. Attackers can remotely exploit this vulnerability without authentication to gain insights into the internal workings of the free5gc UDM service, facilitating service fingerprinting and reconnaissance. This information can be used to identify specific versions, configurations, or weaknesses in the 5G core network infrastructure, potentially aiding in more targeted and sophisticated attacks. While it does not directly compromise confidentiality, integrity, or availability, the vulnerability lowers the attacker's effort to map the network and identify exploitable components. Given that free5gc is used in 5G core networks, which are critical infrastructure, this vulnerability could indirectly increase the risk of more severe attacks against telecommunications providers and their customers worldwide.

Mitigation Recommendations

Organizations using free5gc UDM should immediately apply the official patch provided in free5gc/udm pull request 75 to remediate the vulnerability. Since no direct application-level workaround exists, patching is the primary mitigation strategy. Additionally, network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) can be configured to detect and block requests containing suspicious control characters or malformed supi parameters to reduce exposure. Monitoring logs for unusual URL parsing errors or repeated malformed requests can help detect exploitation attempts. It is also advisable to restrict access to the Nudm_UEAU service to trusted networks or through secure VPNs to limit exposure. Regularly updating free5gc components and following secure coding practices for input validation in custom deployments will help prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.029Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604e9

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 2/24/2026, 1:02:46 AM

Last updated: 2/24/2026, 6:02:09 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats