Home

Description

A vulnerability was identified in Free5GC up to 4.1.0. This affects the function ResolveNodeIdToIp of the file internal/sbi/processor/datapath.go of the component SMF. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. It is recommended to apply a patch to fix this issue.

PUBLISHED Reserved 2026-02-05 | Published 2026-02-06 | Updated 2026-02-06 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
5.0AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

Problem types

Denial of Service

Timeline

2026-02-05:Advisory disclosed
2026-02-05:VulDB entry created
2026-02-05:VulDB entry last update

Credits

ZiyuLin (VulDB User) reporter

References

vuldb.com/?id.344496 (VDB-344496 | Free5GC SMF datapath.go ResolveNodeIdToIp denial of service) vdb-entry technical-description

vuldb.com/?ctiid.344496 (VDB-344496 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.743237 (Submit #743237 | free5gc SMF v4.1.0 Denial of Service) third-party-advisory

github.com/free5gc/free5gc/issues/816 issue-tracking

github.com/free5gc/free5gc/issues/816 exploit issue-tracking

github.com/free5gc/smf/pull/189 issue-tracking patch

github.com/free5gc/free5gc/ product

cve.org (CVE-2026-1974)

nvd.nist.gov (CVE-2026-1974)

Download JSON