Description
A weakness has been identified in Free5GC up to 4.1.0. Affected is the function SessionDeletionResponse of the component SMF. This manipulation causes null pointer dereference. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. It is suggested to install a patch to address this issue.
Problem types
Timeline
| 2026-02-05: | Advisory disclosed |
| 2026-02-05: | VulDB entry created |
| 2026-02-05: | VulDB entry last update |
Credits
LinZiyu (VulDB User)
References
vuldb.com/?id.344498 (VDB-344498 | Free5GC SMF SessionDeletionResponse null pointer dereference)
vuldb.com/?ctiid.344498 (VDB-344498 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.743239 (Submit #743239 | free5gc SMF v4.1.0 Denial of Service)
github.com/free5gc/free5gc/issues/817
github.com/free5gc/free5gc/issues/817
github.com/free5gc/smf/pull/189
github.com/free5gc/free5gc/