CVE-2026-1973
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-02-06

Last updated on: 2026-02-09

Assigner: VulDB

Description
A vulnerability was determined in Free5GC up to 4.1.0. The impacted element is the function establishPfcpSession of the component SMF. Executing a manipulation can lead to null pointer dereference. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. It is best practice to apply a patch to resolve this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-02-09
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
free5gc free5gc to 4.1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-404 The product does not release or incorrectly releases a resource before it is made available for re-use.
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-1973 is a vulnerability in Free5GC versions up to 4.1.0, specifically in the Session Management Function (SMF) component's establishPfcpSession function. The issue is a null pointer dereference that occurs when the SMF processes a malformed PFCP SessionEstablishmentResponse message missing the mandatory Cause Information Element (IE). This causes the SMF process to crash, resulting in a denial of service."}, {'type': 'paragraph', 'content': 'The vulnerability can be exploited remotely without authentication by a rogue or malicious User Plane Function (UPF) that sends crafted PFCP messages omitting required fields. The SMF does not properly check for the presence of the Cause IE before dereferencing it, leading to the crash.'}, {'type': 'paragraph', 'content': 'A proof-of-concept exploit exists that demonstrates how a rogue UPF can trigger this crash by responding to PFCP SessionEstablishmentRequest messages with malformed responses.'}] [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can cause a denial of service (DoS) on the Free5GC SMF component by crashing the process when it receives malformed PFCP messages. This impacts system availability, potentially disrupting network services that rely on Free5GC for session management.

Since the attack can be launched remotely without any authentication or user interaction, it is highly accessible to attackers controlling a rogue UPF. This could lead to service outages or degraded network performance.

The exploit is relatively easy to perform, and a proof-of-concept is publicly available, increasing the risk of exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring the behavior of the free5gc SMF component, specifically looking for crashes or denial of service conditions triggered by malformed PFCP SessionEstablishmentResponse messages.

A practical detection method involves running a proof-of-concept (PoC) rogue UPF server that sends a crafted PFCP SessionEstablishmentResponse message missing the mandatory Cause Information Element (IE) to the SMF. If the SMF crashes or terminates unexpectedly, it indicates the presence of the vulnerability.

Suggested commands include running the PoC rogue UPF server implemented in Go with a command similar to: `go run ./main.go -listen x.x.x.x` where `x.x.x.x` is the IP address to listen on. This server listens on UDP port 8805 and interacts with the SMF to trigger the vulnerability.

Additionally, monitoring system logs for SMF crashes or core dumps related to the `establishPfcpSession` function can help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The immediate and recommended mitigation step is to apply the official patch provided by the free5gc project that fixes the nil pointer dereference issue in the establishPfcpSession function of the SMF component.

Since the vulnerability can be exploited remotely without authentication, patching is critical to prevent denial of service attacks.

Until the patch is applied, consider monitoring and restricting network traffic to the SMF, especially PFCP messages from untrusted or rogue UPF sources, to reduce the risk of exploitation.

It is also best practice to keep the free5gc SMF component updated to the latest secure version and review logs for any suspicious activity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart