CVE-2026-40246
Received Received - Intake
Improper Access Control in free5GC UDR Allows Subscription Deletion

Publication date: 2026-04-16

Last updated on: 2026-04-21

Assigner: GitHub, Inc.

Description
free5GC is an open-source implementation of the 5G core network. In versions 1.4.2 and below of the UDR service, the handler for deleting Traffic Influence Subscriptions checks whether the influenceId path segment equals subs-to-notify, but does not return after sending the HTTP 404 response when validation fails. Execution continues and the subscription is deleted regardless. An unauthenticated attacker with access to the 5G Service Based Interface can delete arbitrary Traffic Influence Subscriptions by supplying any value for the influenceId path segment, while the API misleadingly returns a 404 Not Found response. A patched version was not available at the time of publication.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-16
Last Modified
2026-04-21
Generated
2026-05-07
AI Q&A
2026-04-17
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
free5gc free5gc to 1.4.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in free5GC, an open-source 5G core network implementation, specifically in versions 1.4.2 and below of the UDR service. The issue is in the handler responsible for deleting Traffic Influence Subscriptions. It checks if the influenceId path segment equals 'subs-to-notify', but even if this validation fails and an HTTP 404 response is sent, the code does not stop execution. As a result, the subscription is deleted regardless of the validation failure.

An unauthenticated attacker who has access to the 5G Service Based Interface can exploit this by supplying any value for the influenceId path segment. The API will misleadingly return a 404 Not Found response, but the deletion of arbitrary Traffic Influence Subscriptions still occurs.


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated attacker with access to the 5G Service Based Interface to delete arbitrary Traffic Influence Subscriptions. This can disrupt network traffic management and influence policies, potentially leading to denial of service or degraded network performance for users relying on those subscriptions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart