CVE-2025-69232

free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:free5gc:go-upf:*:*:*:*:*:go:*:*
cpe:2.3:a:free5gc:smf:*:*:*:*:*:go:*:*

History

25 Feb 2026, 16:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Free5gc smf
Free5gc go-upf
Free5gc
Summary
  • (es) free5GC es un proyecto de código abierto para redes móviles de núcleo de 5ª generación (5G). free5GC go-upf versiones hasta la 1.2.6 inclusive, correspondientes a free5gc smf hasta la 1.4.0 inclusive, tienen una vulnerabilidad de Validación de Entrada Inadecuada y Cumplimiento de Protocolo que conlleva a una Denegación de Servicio. Los atacantes remotos pueden interrumpir la funcionalidad de la red de núcleo enviando una Solicitud de Configuración de Asociación PFCP malformada. El UPF la acepta incorrectamente, entrando en un estado inconsistente que causa que las solicitudes legítimas subsiguientes activen bucles de reconexión del SMF y degradación del servicio. Todas las implementaciones de free5GC que utilizan los componentes UPF y SMF pueden verse afectadas. En el momento de la publicación, se está desarrollando una corrección pero aún no está disponible. No hay una solución alternativa directa disponible a nivel de aplicación. Se recomienda aplicar el parche oficial, una vez lanzado.
References () https://github.com/free5gc/free5gc/issues/745 - () https://github.com/free5gc/free5gc/issues/745 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/free5gc/free5gc/security/advisories/GHSA-8m42-qw58-8362 - () https://github.com/free5gc/free5gc/security/advisories/GHSA-8m42-qw58-8362 - Vendor Advisory
CPE cpe:2.3:a:free5gc:go-upf:*:*:*:*:*:go:*:*
cpe:2.3:a:free5gc:smf:*:*:*:*:*:go:*:*

24 Feb 2026, 00:16

Type Values Removed Values Added
Summary (en) free5GC is an an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended. (en) free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.

23 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-23 22:16

Updated : 2026-02-25 16:20


NVD link : CVE-2025-69232

Mitre link : CVE-2025-69232

CVE.ORG link : CVE-2025-69232


JSON object : View

Products Affected

free5gc

  • go-upf
  • smf
CWE
CWE-20

Improper Input Validation