Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33062: CWE-284: Improper Access Control in free5gc nrf

0
High
VulnerabilityCVE-2026-33062cvecve-2026-33062cwe-284
Published: Fri Mar 20 2026 (03/20/2026, 02:46:56 UTC)
Source: CVE Database V5
Vendor/Project: free5gc
Product: nrf

Description

CVE-2026-33062 is a high-severity vulnerability in free5GC's NRF component prior to version 1. 4. 2. It arises from improper input validation in the EncodeGroupId function, which accesses array indices without verifying the length of the input data. A remote attacker can exploit this by sending a malformed HTTP GET request with a crafted group-id-list parameter, causing the NRF service to panic and crash, resulting in a denial of service. This affects all deployments using the NRF discovery service. There is no direct application-level workaround; mitigation requires patching to version 1. 4. 2 or restricting API access to trusted sources. The vulnerability has a CVSS 4.

AI-Powered Analysis

AILast updated: 03/20/2026, 03:39:01 UTC

Technical Analysis

The vulnerability CVE-2026-33062 affects the Network Repository Function (NRF) component of free5GC, an open-source 5G core network implementation. The root cause is improper input validation in the EncodeGroupId function, which processes the group-id-list parameter. Specifically, the function splits the input string and attempts to access array indices [0], [1], and [2] without confirming that the split operation produced enough elements. If an attacker sends a malformed HTTP GET request with a group-id-list parameter containing insufficient separator characters, the function attempts to access out-of-range indices, causing a runtime panic and crashing the NRF service. This crash leads to a complete denial of service for the NRF discovery service, which is critical for 5G core network operations as it manages service discovery and registration. The vulnerability requires no authentication or user interaction and can be triggered remotely over the network. The issue is fixed in free5GC NRF version 1.4.2. Since there is no direct application-level workaround, organizations must either upgrade or restrict access to the NRF API to trusted entities. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no privileges or user interaction required, no confidentiality or integrity impact, but high availability impact due to service crash.

Potential Impact

This vulnerability can cause a complete denial of service of the NRF discovery service in free5GC deployments, disrupting critical 5G core network functions such as service discovery and registration. The NRF is a fundamental component in the 5G core architecture, and its unavailability can lead to service outages, degraded network performance, and potential cascading failures in dependent network functions. For telecom operators and enterprises relying on free5GC, this can translate into significant operational disruptions, customer service degradation, and potential financial losses. Since the attack requires no authentication and can be executed remotely, the attack surface is broad, increasing the risk of exploitation. Although no known exploits are reported in the wild yet, the simplicity of triggering the crash makes it a likely target for denial-of-service attacks. The lack of confidentiality or integrity impact limits data breach risks, but the availability impact alone is critical for network reliability and service continuity.

Mitigation Recommendations

The primary mitigation is to upgrade free5GC NRF to version 1.4.2 or later, where the input validation issue in EncodeGroupId is fixed. Until patching is possible, organizations should implement strict network-level access controls to restrict NRF API access to trusted and authenticated sources only, such as internal network segments or VPNs. Deploying Web Application Firewalls (WAFs) or API gateways that can detect and block malformed requests targeting the group-id-list parameter can provide additional protection. Monitoring NRF service logs and network traffic for unusual or malformed requests can help detect attempted exploitation. Implementing redundancy and failover mechanisms for NRF services can reduce the impact of potential crashes. Finally, integrating this vulnerability into incident response plans and conducting regular security assessments of 5G core components will improve preparedness against denial-of-service attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T19:27:06.343Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcbde5e32a4fbe5f2545c2

Added to database: 3/20/2026, 3:24:21 AM

Last enriched: 3/20/2026, 3:39:01 AM

Last updated: 3/20/2026, 4:35:59 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses