Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33062: CWE-284: Improper Access Control in free5gc nrf

0
High
VulnerabilityCVE-2026-33062cvecve-2026-33062cwe-284
Published: Fri Mar 20 2026 (03/20/2026, 02:46:56 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: nrf

Description

free5GC is an open source 5G core network. free5GC NRF prior to version 1.4.2 has an Improper Input Validation vulnerability leading to Denial of Service. All deployments of free5GC using the NRF discovery service are affected. The `EncodeGroupId` function attempts to access array indices [0], [1], [2] without validating the length of the split data. When the parameter contains insufficient separator characters, the code panics with "index out of range". A remote attacker can cause the NRF service to panic and crash by sending a crafted HTTP GET request with a malformed `group-id-list` parameter. This results in complete denial of service for the NRF discovery service. free5GC NRF version 1.4.2 fixes the issue. There is no direct workaround at the application level. The recommendation is to apply the provided patch or restrict access to the NRF API to trusted sources only.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:30:48 UTC

Technical Analysis

The vulnerability identified as CVE-2026-33062 affects the Network Repository Function (NRF) component of free5GC, an open-source 5G core network implementation. The root cause is improper input validation in the EncodeGroupId function, which processes the group-id-list parameter. Specifically, the function splits the input string and attempts to access array indices [0], [1], and [2] without confirming that the split result contains enough elements. If the input string is malformed and lacks sufficient separator characters, this leads to an 'index out of range' panic, causing the NRF service to crash. Since the NRF is responsible for service discovery within the 5G core network, its unavailability results in a denial of service affecting all dependent network functions. The vulnerability can be triggered remotely via a crafted HTTP GET request without any authentication or user interaction, making exploitation straightforward. The issue affects all free5GC NRF versions prior to 1.4.2, with the vendor releasing version 1.4.2 to address the flaw. No direct application-level workaround exists, but restricting access to the NRF API to trusted sources can reduce exposure. The CVSS 4.0 score of 8.7 reflects the vulnerability's network attack vector, low complexity, no privileges required, and high impact on availability. There are no known exploits in the wild at the time of publication, but the simplicity of triggering the crash suggests a high risk if targeted. This vulnerability falls under CWE-284 (Improper Access Control) due to insufficient validation leading to service disruption.

Potential Impact

The primary impact of CVE-2026-33062 is a denial of service condition on the NRF discovery service within free5GC-based 5G core networks. Since the NRF is critical for service discovery and registration of network functions, its unavailability can disrupt the entire 5G core network operation, potentially affecting subscriber connectivity, session management, and network function orchestration. This can lead to widespread service outages, degraded network performance, and loss of revenue for network operators. The vulnerability requires no authentication and can be exploited remotely, increasing the risk of automated or targeted attacks. Organizations relying on free5GC for 5G core deployments, especially those in production environments, face operational risks and potential regulatory compliance issues if network availability is compromised. The lack of a direct application-level workaround means that until patched, networks remain vulnerable unless access controls are strictly enforced. The impact extends beyond individual operators to potentially affect end-users and critical services relying on 5G connectivity.

Mitigation Recommendations

To mitigate CVE-2026-33062, organizations should immediately upgrade free5GC NRF to version 1.4.2 or later, where the input validation flaw has been corrected. In environments where immediate patching is not feasible, network administrators should implement strict access controls to limit NRF API exposure only to trusted and authenticated sources, such as internal network segments or VPNs. Deploying Web Application Firewalls (WAFs) or API gateways with input validation rules to detect and block malformed group-id-list parameters can provide additional protection. Monitoring NRF service logs and network traffic for unusual or malformed requests targeting the group-id-list parameter can help detect attempted exploitation. Network segmentation and zero-trust principles should be applied to isolate the NRF service from untrusted networks. Finally, organizations should incorporate this vulnerability into their incident response and vulnerability management processes to ensure timely remediation and awareness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T19:27:06.343Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcbde5e32a4fbe5f2545c2

Added to database: 3/20/2026, 3:24:21 AM

Last enriched: 3/27/2026, 7:30:48 PM

Last updated: 5/2/2026, 8:15:57 PM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses