Home

Description

free5GC go-upf is the User Plane Function (UPF) implementation for 5G networks that is part of the free5GC project. Versions prior to 1.2.8 have a Heap-based Buffer Overflow (CWE-122) vulnerability leading to Denial of Service. Remote attackers can crash the UPF network element by sending a specially crafted PFCP Session Modification Request with an invalid SDF Filter length field. This causes a heap buffer overflow, resulting in complete service disruption for all connected UEs and potential cascading failures affecting the SMF. All deployments of free5GC using the UPF component may be affected. Version 1.2.8 of go-upf contains a fix.

PUBLISHED Reserved 2025-12-30 | Published 2026-02-23 | Updated 2026-02-23 | Assigner GitHub_M




LOW: 2.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

< 1.2.8
affected

References

github.com/...ree5gc/security/advisories/GHSA-gf69-93xr-p23g

github.com/free5gc/free5gc/issues/746

github.com/free5gc/go-upf/pull/85

github.com/...ommit/b798fe5ee6a984be492fa53958dd5f1305469f85

cve.org (CVE-2025-69247)

nvd.nist.gov (CVE-2025-69247)

Download JSON