CVE-2025-66719
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-23

Last updated on: 2026-02-11

Assigner: MITRE

Description
An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the AccessTokenScopeCheck() function in file internal/sbi/processor/access_token.go bypasses all scope validation when the attacker uses a crafted targetNF value. This allows attackers to obtain an access token with any arbitrary scope.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-23
Last Modified
2026-02-11
Generated
2026-05-07
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
free5gc nrf 1.4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the free5GC NRF component's access-token generation logic. Specifically, the AccessTokenScopeCheck() function bypasses all scope validation when the access token request includes the parameter targetNF set to "NRF". This means an attacker can craft a request with targetNF=NRF and obtain an access token with any arbitrary scope, including privileged scopes they are not authorized for. This happens because the function returns early without validating scopes for targetNF=NRF, allowing unauthorized Network Functions to escalate privileges by accessing services they shouldn't. [1, 2]


How can this vulnerability impact me? :

This vulnerability allows attackers to obtain access tokens with arbitrary scopes by bypassing scope validation. As a result, unauthorized Network Functions can escalate privileges and access protected services and sensitive subscriber data within the 5G core network. For example, a UDR NF could access UDM services it is not authorized to use, potentially leading to unauthorized data access and compromise of network security. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring access token requests sent to the NRF component, specifically looking for requests where the parameter targetNF is set to "NRF" and the scope requested is beyond the authorized scopes for the requesting NF. One can reproduce the detection by sending an access token request with parameters such as grant_type=client_credentials, nfInstanceId=<NF_INSTANCE_ID>, nfType=<NF_TYPE>, targetNfType=NRF, and scope=<privileged_scope>. If the NRF issues a token with the requested privileged scope despite the NF not being authorized, the vulnerability is present. Commands to test this could involve using curl or similar HTTP clients to send such requests to the NRF's token endpoint and observe the responses. For example: ```bash curl -X POST https://<NRF_ADDRESS>/oauth/token -d 'grant_type=client_credentials&nfInstanceId=<NF_INSTANCE_ID>&nfType=<NF_TYPE>&targetNfType=NRF&scope=nudm-sdm' -H 'Content-Type: application/x-www-form-urlencoded' ``` If the response returns HTTP 200 OK with the requested scope, the vulnerability exists. Proper behavior would be HTTP 403 Forbidden or an invalid_scope error. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the free5gc NRF component to a version that includes the patch removing the early exit condition in AccessTokenScopeCheck() that bypasses scope validation for targetNF=NRF. The patch enforces strict scope validation against a predefined list of valid NRF service scopes and rejects invalid scope requests with an "invalid_scope" error. Until the patch is applied, restrict access to the NRF token endpoint to trusted clients only and monitor for suspicious token requests with targetNF=NRF. Applying network-level controls and auditing token issuance logs can help reduce exploitation risk. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers to obtain access tokens with arbitrary scopes, enabling unauthorized access to protected services and sensitive subscriber data within the 5G core network. Such unauthorized access and potential data exposure could lead to violations of data protection regulations like GDPR and HIPAA, which mandate strict controls on access to personal and sensitive information. Therefore, the vulnerability poses a risk to compliance with these common standards and regulations by undermining access control mechanisms and potentially exposing protected data. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart