CVE-2025-70123
Improper Input Validation in free5GC UPF Causes DoS
Publication date: 2026-02-13
Last updated on: 2026-02-18
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| free5gc | free5gc | 4.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper input validation and protocol compliance issue in free5GC version 4.0.1. Specifically, the User Plane Function (UPF) incorrectly accepts a malformed PFCP Association Setup Request, which violates the 3GPP TS 29.244 standard.
As a result, the UPF enters an inconsistent state. When a subsequent valid PFCP Session Establishment Request is received, it triggers a cascading failure that disrupts the Session Management Function (SMF) connection and causes service degradation.
How can this vulnerability impact me? :
This vulnerability can lead to a denial of service condition by causing the UPF to enter an inconsistent state and disrupting the SMF connection.
The cascading failure triggered by the malformed request results in service degradation, potentially affecting network availability and reliability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know