Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27642: CWE-20: Improper Input Validation in free5gc udm

0
Medium
VulnerabilityCVE-2026-27642cvecve-2026-27642cwe-20
Published: Tue Feb 24 2026 (02/24/2026, 00:18:56 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: udm

Description

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the supi parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system-level error details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UEAU service may be affected. free5gc/udm pull request 75 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:40:34 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27642 affects the Unified Data Management (UDM) component of free5gc, an open-source 5G core network implementation. Specifically, in versions up to and including 1.4.1, the UDM's Nudm_UEAU service improperly validates input in the supi parameter, allowing remote attackers to inject control characters such as the null byte (%00). This improper input validation (classified under CWE-20) leads to internal URL parsing errors within the Go net/url package, which does not accept control characters. When such malformed input is processed, the system returns detailed error messages exposing internal parsing logic and error states. Although this does not directly lead to remote code execution or denial of service, the exposure of internal error details can facilitate service fingerprinting by attackers, aiding in reconnaissance and potentially enabling more targeted attacks. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The free5gc project has addressed this issue in a pull request (PR 75), but no direct application-level workarounds exist, making patching the primary mitigation strategy. The vulnerability has a CVSS v4.0 base score of 6.6, reflecting medium severity, with network attack vector, low attack complexity, and no privileges or user interaction required.

Potential Impact

The primary impact of CVE-2026-27642 is information disclosure through detailed error messages, which can aid attackers in fingerprinting the free5gc UDM service and understanding its internal workings. This reconnaissance capability can be leveraged to identify vulnerable deployments and plan subsequent attacks, potentially targeting 5G core network infrastructure. While the vulnerability itself does not directly compromise confidentiality, integrity, or availability, the information gained can increase the risk of further exploitation. For organizations deploying free5gc as part of their 5G core network, this could lead to increased exposure to targeted attacks, potentially affecting network reliability and security. Given the critical role of UDM in subscriber data management within 5G networks, any compromise or attack facilitated by reconnaissance could have downstream effects on subscriber privacy and network operations. The lack of authentication requirement and ease of remote exploitation increase the threat surface, especially for publicly accessible UDM services.

Mitigation Recommendations

Organizations should prioritize applying the official patch provided by the free5gc project (pull request 75) to remediate this vulnerability. Since no direct application-level workarounds exist, patching is the most effective mitigation. Additionally, network-level protections should be implemented, such as restricting access to the Nudm_UEAU service to trusted management networks or using firewall rules to limit exposure. Deploying Web Application Firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking control character injection attempts can provide an additional layer of defense. Monitoring logs for unusual URL parsing errors or malformed requests targeting the supi parameter can help detect exploitation attempts. Finally, organizations should ensure that their free5gc deployments are regularly updated and incorporate security best practices for 5G core network components, including segmentation and strict access controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.029Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf533be58cf853bf604e9

Added to database: 2/24/2026, 12:47:47 AM

Last enriched: 3/3/2026, 8:40:34 PM

Last updated: 4/9/2026, 3:51:23 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses