free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.
References
| Link | Resource |
|---|---|
| https://github.com/free5gc/free5gc/issues/745 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/free5gc/free5gc/security/advisories/GHSA-8m42-qw58-8362 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Feb 2026, 16:20
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Free5gc smf
Free5gc go-upf Free5gc |
|
| Summary |
|
|
| References | () https://github.com/free5gc/free5gc/issues/745 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/free5gc/free5gc/security/advisories/GHSA-8m42-qw58-8362 - Vendor Advisory | |
| CPE | cpe:2.3:a:free5gc:go-upf:*:*:*:*:*:go:*:* cpe:2.3:a:free5gc:smf:*:*:*:*:*:go:*:* |
24 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended. |
23 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-23 22:16
Updated : 2026-02-25 16:20
NVD link : CVE-2025-69232
Mitre link : CVE-2025-69232
CVE.ORG link : CVE-2025-69232
JSON object : View
Products Affected
free5gc
- go-upf
- smf
CWE
CWE-20
Improper Input Validation
