CVE-2025-70123
Awaiting Analysis Awaiting Analysis - Queue
Improper Input Validation in free5GC UPF Causes DoS

Publication date: 2026-02-13

Last updated on: 2026-02-18

Assigner: MITRE

Description
An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This places the UPF in an inconsistent state where a subsequent valid PFCP Session Establishment Request triggers a cascading failure, disrupting the SMF connection and causing service degradation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-13
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
free5gc free5gc 4.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper input validation and protocol compliance issue in free5GC version 4.0.1. Specifically, the User Plane Function (UPF) incorrectly accepts a malformed PFCP Association Setup Request, which violates the 3GPP TS 29.244 standard.

As a result, the UPF enters an inconsistent state. When a subsequent valid PFCP Session Establishment Request is received, it triggers a cascading failure that disrupts the Session Management Function (SMF) connection and causes service degradation.


How can this vulnerability impact me? :

This vulnerability can lead to a denial of service condition by causing the UPF to enter an inconsistent state and disrupting the SMF connection.

The cascading failure triggered by the malformed request results in service degradation, potentially affecting network availability and reliability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart