CVE-2025-65568
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-18

Last updated on: 2025-12-19

Assigner: MITRE

Description
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a PFCP Session Establishment Request that includes a CreateFAR with an empty or truncated IPv4 address field is not properly validated. During parsing, parseFAR() calls ip2int(), which performs an out-of-bounds read on the IPv4 address buffer and triggers an index-out-of-range panic. An attacker who can send PFCP Session Establishment Request messages to the UPF's N4/PFCP endpoint can exploit this issue to repeatedly crash the UPF and disrupt user-plane services.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-18
Last Modified
2025-12-19
Generated
2026-05-07
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
omec-project upf 2.1.3-dev
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-65568 is a denial-of-service vulnerability in the omec-project UPF (User Plane Function) version upf-epc-pfcpiface:2.1.3-dev. It occurs when the UPF processes a PFCP Session Establishment Request containing a CreateFAR with an empty or truncated IPv4 address field. The vulnerability arises because the code does not properly validate the IPv4 address field and attempts to convert it to an integer, leading to an out-of-bounds read and a runtime panic (index out of range). This causes the UPF process to crash, disrupting user-plane services. [1]


How can this vulnerability impact me? :

This vulnerability can be exploited by an attacker who can send PFCP Session Establishment Request messages to the UPF's N4/PFCP endpoint. By sending a specially crafted request with a malformed CreateFAR containing an empty or truncated IPv4 address, the attacker can cause the UPF to crash repeatedly. This results in a denial-of-service condition, disrupting user-plane services and potentially causing service outages or degraded network performance. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring the UPF logs for panic or crash messages related to out-of-bounds reads in the ip2int function during PFCP Session Establishment Requests. Specifically, look for logs showing a runtime panic with an index out of range error triggered by malformed PFCP Session Establishment Requests containing CreateFAR with empty or truncated IPv4 address fields. Additionally, you can use network packet capture tools (e.g., tcpdump) to capture PFCP messages on the N4/PFCP interface and inspect Session Establishment Requests for CreateFAR entries with missing or empty IPv4 addresses. Commands to assist detection include: 1) `journalctl -u upf -f` or checking UPF service logs for panic stack traces referencing ip2int or parseFAR functions; 2) `tcpdump -i <interface> port 8805 -w pfcp_capture.pcap` to capture PFCP traffic (port 8805 is the default PFCP port), then analyze the capture with Wireshark or tshark to identify malformed CreateFAR entries with empty IPv4 addresses. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Restrict or filter access to the UPF's N4/PFCP endpoint to trusted sources only, preventing untrusted or malicious actors from sending PFCP Session Establishment Requests; 2) Monitor and block malformed PFCP messages that contain CreateFAR entries with empty or truncated IPv4 address fields; 3) If possible, apply any available patches or updates from the omec-project that address this vulnerability; 4) As a temporary workaround, consider implementing network-level protections such as firewall rules or PFCP message validation proxies to detect and drop malformed PFCP Session Establishment Requests before they reach the UPF. These steps help prevent attackers from exploiting the vulnerability to crash the UPF and cause denial-of-service. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart