CVE-2026-27642

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the supi parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system-level error details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UEAU service may be affected. free5gc/udm pull request 75 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
Configurations

Configuration 1 (hide)

cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:*

History

25 Feb 2026, 16:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
Summary
  • (es) free5gc UDM proporciona Gestión Unificada de Datos (UDM) para free5GC, un proyecto de código abierto para redes centrales móviles de quinta generación (5G). En versiones hasta la 1.4.1 inclusive, atacantes remotos pueden inyectar caracteres de control (p. ej., %00) en el parámetro supi, desencadenando errores internos de análisis de URL (net/url: invalid control character). Esto expone detalles de errores a nivel de sistema y puede utilizarse para el fingerprinting de servicios. Todas las implementaciones de free5GC que utilizan el servicio UDM Nudm_UEAU pueden verse afectadas. free5gc/udm pull request 75 contiene una corrección para el problema. No hay una solución alternativa directa disponible a nivel de aplicación. Se recomienda aplicar el parche oficial.
First Time Free5gc udm
Free5gc
CPE cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:*
References () https://github.com/free5gc/free5gc/issues/749 - () https://github.com/free5gc/free5gc/issues/749 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/free5gc/free5gc/security/advisories/GHSA-h4wg-rp7m-8xx4 - () https://github.com/free5gc/free5gc/security/advisories/GHSA-h4wg-rp7m-8xx4 - Vendor Advisory
References () https://github.com/free5gc/udm/commit/a7af2321ddea6368c43835f90f6d1b9d67dd2ea1 - () https://github.com/free5gc/udm/commit/a7af2321ddea6368c43835f90f6d1b9d67dd2ea1 - Patch
References () https://github.com/free5gc/udm/pull/75 - () https://github.com/free5gc/udm/pull/75 - Issue Tracking, Patch

24 Feb 2026, 01:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-24 01:16

Updated : 2026-02-25 16:44


NVD link : CVE-2026-27642

Mitre link : CVE-2026-27642

CVE.ORG link : CVE-2026-27642


JSON object : View

Products Affected

free5gc

  • udm
CWE
CWE-20

Improper Input Validation