CVE-2026-27643
Received Received - Intake
Information Disclosure in free5GC NEF Component via Parsing Error Leak

Publication date: 2026-02-24

Last updated on: 2026-02-25

Assigner: GitHub, Inc.

Description
free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be affected. free5gc/udr pull request 56 contains a patch for the issue. There is no direct workaround at the application level. The recommendation is to apply the provided patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-24
Last Modified
2026-02-25
Generated
2026-05-07
AI Q&A
2026-02-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
free5gc udr to 1.4.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-209 The product generates an error message that includes sensitive information about its environment, users, or associated data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-27643 is an improper error handling vulnerability in the free5GC UDR (Unified Data Repository) component, specifically affecting the NEF (Network Exposure Function) component's handling of the Nnef_PfdManagement GET request."}, {'type': 'paragraph', 'content': "When a client requests Policy Flow Description (PFD) data for a non-existent application ID, the UDR correctly returns a 404 Not Found error. However, the NEF component incorrectly tries to parse the 404 error response body as JSON, which fails due to malformed content (e.g., an unexpected 'null' string appended). This parsing failure causes NEF to respond with a misleading 500 Internal Server Error instead of propagating the correct 404 status."}, {'type': 'paragraph', 'content': 'This improper handling leaks internal parsing error details (such as "invalid character \'n\' after top-level value") to remote clients, which can aid attackers in fingerprinting the service and understanding internal logic.'}, {'type': 'paragraph', 'content': 'The root cause was missing return statements after sending error responses in several functions, allowing further unintended code execution that corrupted the response body. The issue was fixed by adding these missing return statements to properly halt execution after errors.'}] [1, 3, 4]


How can this vulnerability impact me? :

This vulnerability can impact you by causing the NEF component to leak internal error details to remote clients, which can be exploited by attackers to fingerprint the service and gain insights into its internal workings.

Additionally, the NEF incorrectly returns a 500 Internal Server Error instead of the appropriate 404 Not Found status when requested data is missing. This misrepresentation of error states can confuse clients and complicate troubleshooting.

Such information exposure and improper error signaling can be leveraged in probing or reconnaissance attacks against your 5G core network infrastructure.

There is no direct application-level workaround; the recommended action is to apply the patch that fixes the error handling.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by issuing a GET request to the NEF endpoint for a non-existent application PFD and observing the response and logs.'}, {'type': 'paragraph', 'content': 'Specifically, if the NEF component returns a 500 Internal Server Error with an internal parsing error message such as "invalid character \'n\' after top-level value" instead of a 404 Not Found, this indicates the presence of the vulnerability.'}, {'type': 'paragraph', 'content': 'A suggested command to test this is to disable OAuth in the nrfcfg.yaml configuration, start free5GC, and then run a GET request like:'}, {'type': 'list_item', 'content': 'curl -X GET http://<NEF_IP>:<NEF_PORT>/nnrf-nnef-pfdmanagement/v1/applications/<non-existent-app-id>/pfd'}, {'type': 'paragraph', 'content': 'Check the NEF logs for APIService errors related to JSON parsing failures and verify that the UDR returns a 404 Not Found while NEF incorrectly returns a 500 error.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to apply the patch provided in free5GC UDR pull request #56, which adds missing return statements after error responses to prevent improper error handling and information leakage.

There is no direct workaround at the application level other than upgrading to a fixed version of free5GC that includes this patch.

Users should upgrade to free5GC versions including the fix merged on January 12, 2026, which corrects the error handling in the NEF and UDR components.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart