Home

Description

A vulnerability has been found in Free5GC 4.2.0. The affected element is an unknown function of the component aper. Such manipulation leads to type confusion. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 26205eb01705754b7b902ad6c4b613c96c881e29. It is best practice to apply a patch to resolve this issue.

PUBLISHED Reserved 2026-04-01 | Published 2026-04-02 | Updated 2026-04-03 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2.6AV:N/AC:H/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C

Problem types

Type Confusion

Timeline

2026-04-01:Advisory disclosed
2026-04-01:VulDB entry created
2026-04-01:VulDB entry last update

Credits

shovon0203 (VulDB User) reporter

References

vuldb.com/vuln/354735 (VDB-354735 | Free5GC aper type confusion) vdb-entry

vuldb.com/vuln/354735/cti (VDB-354735 | CTI Indicators (IOB, IOC)) signature permissions-required

vuldb.com/submit/781573 (Submit #781573 | Linux Foundation free5GC 4.2.0 Type Confusion) third-party-advisory

github.com/free5gc/free5gc/issues/831 issue-tracking

github.com/free5gc/aper/pull/11 issue-tracking patch

github.com/free5gc/free5gc/issues/831 exploit issue-tracking

github.com/...ommit/26205eb01705754b7b902ad6c4b613c96c881e29 patch

github.com/free5gc/free5gc/ product

cve.org (CVE-2026-5360)

nvd.nist.gov (CVE-2026-5360)

Download JSON