CVE-2026-33064
Received Received - Intake
Nil Pointer Dereference in Free5GC UDM Causes Service Crash

Publication date: 2026-03-20

Last updated on: 2026-03-23

Assigner: GitHub, Inc.

Description
Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions prior to 1.4.2 are vulnerable to procedure panic caused by Nil Pointer Dereference in the /sdm-subscriptions endpoint. A remote attacker can cause the UDM service to panic and crash by sending a crafted POST request to the /sdm-subscriptions endpoint with a malformed URL path containing path traversal sequences (../) and a large JSON payload. The DataChangeNotificationProcedure function in notifier.go attempts to access a nil pointer without proper validation, causing a complete service crash with "runtime error: invalid memory address or nil pointer dereference". Exploitation would result in UDM functionality disruption until recovery by restart. This issue has been fixed in version 1.4.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-20
Last Modified
2026-03-23
Generated
2026-05-07
AI Q&A
2026-03-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
free5gc udm to 1.4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-478 The code does not have a default case in an expression with multiple conditions, such as a switch statement.
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-33064 is a high-severity vulnerability in the Unified Data Management (UDM) component of free5GC, an open-source 5G core network project. The issue arises from a nil pointer dereference in the DataChangeNotificationProcedure function within notifier.go. When the UDM service receives a specially crafted POST request to the /sdm-subscriptions endpoint containing a malformed URL path with path traversal sequences (../) and a large JSON payload, it attempts to access a nil pointer without proper validation.'}, {'type': 'paragraph', 'content': 'This causes a runtime panic with the error message "invalid memory address or nil pointer dereference," crashing the entire UDM service. The crash results in a denial of service, disrupting UDM functionality until the service is manually restarted. The vulnerability affects free5GC versions prior to 1.4.2 and has been fixed in that version.'}] [1, 4]


How can this vulnerability impact me? :

Exploitation of this vulnerability allows a remote attacker to cause a complete crash of the UDM service by sending a crafted POST request with a malformed URL and payload. This results in a denial of service, disrupting all UDM functionality until the service is restarted.

Since UDM is a critical component in the 5G core network responsible for managing subscriber data, its disruption can lead to service outages or degraded network performance affecting mobile users.

There is no direct application-level workaround, so affected users must apply the patch or upgrade to a fixed version. Alternatively, API gateway filtering can be used to block malicious requests containing path traversal sequences.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for crashes or panics in the UDM service logs, specifically looking for runtime errors indicating nil pointer dereferences with messages like "runtime error: invalid memory address or nil pointer dereference."'}, {'type': 'paragraph', 'content': 'Additionally, detection can involve sending crafted POST requests to the /sdm-subscriptions endpoint with malformed URL paths containing path traversal sequences (../) and large JSON payloads to see if the UDM service crashes or panics.'}, {'type': 'paragraph', 'content': 'A sample command to test this could be a curl POST request similar to the following (as described in reproduction steps):'}, {'type': 'list_item', 'content': 'curl -X POST "http://127.0.0.3:8000/nudm-sdm/v2/../../sdm-subscriptions?shared-data-ids=[...]" -H "Content-Type: application/json" -d \'{...large JSON payload...}\''}, {'type': 'paragraph', 'content': 'Monitoring logs for panic stack traces in the DataChangeNotificationProcedure function in notifier.go is also recommended to detect exploitation attempts.'}] [4, 1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade free5GC to version 1.4.2 or later, where the vulnerability has been fixed.

If upgrading immediately is not possible, implement API gateway-level filtering to block requests containing path traversal sequences (../) targeting the /sdm-subscriptions endpoint.

Restarting the UDM service after a crash will restore functionality temporarily, but this does not prevent further exploitation.

Applying the patch from pull request free5gc/udm#78, which adds proper nil pointer checks and returns HTTP 204 when UE context is missing, is also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart