CVE-2026-1739
Unknown Unknown - Not Provided
Null Pointer Dereference in Free5GC PCF Enables Remote Crash

Publication date: 2026-02-02

Last updated on: 2026-02-11

Assigner: VulDB

Description
A vulnerability has been found in Free5GC pcf up to 1.4.1. This affects the function HandleCreateSmPolicyRequest of the file internal/sbi/processor/smpolicy.go. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is df535f5524314620715e842baf9723efbeb481a7. Applying a patch is the recommended action to fix this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-02
Last Modified
2026-02-11
Generated
2026-05-07
AI Q&A
2026-02-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
free5gc pcf to 1.4.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-404 The product does not release or incorrectly releases a resource before it is made available for re-use.
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-1739 is a vulnerability in the Free5GC Policy Control Function (PCF) component, specifically in the function HandleCreateSmPolicyRequest. The issue occurs because the code assigns a value from a response object before checking if the response is valid (non-nil). When the PCF receives a CreateSmPolicy request that triggers a downstream OpenAPI call returning a 404 Not Found error, the PCF continues processing without properly handling the error. This leads to a null pointer dereference (accessing data from a nil object), causing the PCF process to panic and crash. This vulnerability can be exploited remotely without authentication, resulting in a denial of service (DoS) by crashing the PCF service. [1, 2, 3, 4, 6]


How can this vulnerability impact me? :

This vulnerability can cause a denial of service (DoS) by crashing the Free5GC PCF process. When exploited, the PCF service handling policy control requests will terminate unexpectedly due to a runtime panic caused by a null pointer dereference. This disrupts the availability of the PCF, potentially impacting network services that rely on it for policy control, leading to service outages or degraded network functionality. [2, 4, 6]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for crashes or panics in the free5GC PCF service, especially after receiving HTTP CreateSmPolicy requests. A crafted POST request to the PCF endpoint `/npcf-smpolicycontrol/v1/sm-policies` with JSON data specifying subscriber and session details that triggers a downstream 404 Not Found error can reproduce the issue. Detection involves checking logs for panic stack traces related to `HandleCreateSmPolicyRequest` and observing if the PCF process crashes. A sample command to test the vulnerability could be a curl POST request with crafted JSON data to the PCF endpoint, for example: ```bash curl -X POST https://<pcf-ip>:<port>/npcf-smpolicycontrol/v1/sm-policies \ -H 'Content-Type: application/json' \ -d '{"subscriber": {"id": "imsi-123456789012345"}, "session": {"id": "session1"}}' ``` If this request causes the PCF to crash or log a panic related to nil pointer dereference, the vulnerability is present. [2, 6]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to apply the patch identified by commit `df535f5524314620715e842baf9723efbeb481a7` on the free5GC PCF GitHub repository. This patch fixes the issue by properly checking for errors and ensuring that `smData` is assigned only after confirming the response is not nil, preventing the null pointer dereference and subsequent crash. Until the patch is applied, monitoring and restricting access to the PCF endpoint to trusted sources may reduce the risk of exploitation. [1, 3, 4]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-1739 causes a denial of service (DoS) by crashing the Free5GC PCF component due to a null pointer dereference. It impacts system availability but does not affect confidentiality or integrity of data.

Since the vulnerability does not compromise confidentiality or integrity, it does not directly lead to data breaches or unauthorized data access that would violate standards like GDPR or HIPAA.

However, the availability impact caused by the DoS could affect compliance with regulations that require continuous availability or service reliability, depending on the criticality of the affected system in the regulated environment.

Overall, the vulnerability primarily risks service disruption rather than data privacy or protection compliance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart