Description
A vulnerability has been found in Free5GC SMF up to 4.1.0. Affected by this vulnerability is the function HandlePfcpSessionReportRequest of the file internal/pfcp/handler/handler.go of the component PFCP. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. To fix this issue, it is recommended to deploy a patch.
Problem types
Product status
4.1.0
Timeline
| 2026-01-30: | Advisory disclosed |
| 2026-01-30: | VulDB entry created |
| 2026-01-30: | VulDB entry last update |
Credits
ZiyuLin (VulDB User)
References
vuldb.com/?id.343476 (VDB-343476 | Free5GC SMF PFCP handler.go HandlePfcpSessionReportRequest denial of service)
vuldb.com/?ctiid.343476 (VDB-343476 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.739653 (Submit #739653 | free5gc SMF v4.1.0 Denial of Service)
vuldb.com/?submit.739654 (Submit #739654 | free5gc SMF v4.1.0 Denial of Service (Duplicate))
github.com/free5gc/free5gc/issues/804
github.com/free5gc/free5gc/issues/804
github.com/free5gc/smf/pull/188