Home

Description

A vulnerability was identified in Free5GC 4.2.0. This affects an unknown function of the component NGSetupRequest Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit is publicly available and might be used.

PUBLISHED Reserved 2026-04-06 | Published 2026-04-06 | Updated 2026-04-06 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
5.0AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR

Problem types

Denial of Service

Timeline

2026-04-06:Advisory disclosed
2026-04-06:VulDB entry created
2026-04-06:VulDB entry last update

Credits

shovon0203 (VulDB User) reporter

References

vuldb.com/vuln/355485 (VDB-355485 | Free5GC NGSetupRequest denial of service) vdb-entry

vuldb.com/vuln/355485/cti (VDB-355485 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/submit/785896 (Submit #785896 | Linux Foundation free5GC 4.2.0 State Synchronization Error) third-party-advisory

github.com/free5gc/free5gc/issues/832 issue-tracking

github.com/free5gc/amf/pull/201 issue-tracking patch

github.com/user-attachments/files/25581199/amfcfg.yaml exploit

github.com/free5gc/free5gc/ product

cve.org (CVE-2026-5661)

nvd.nist.gov (CVE-2026-5661)

Download JSON