CVE-2026-33192

Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. In versions prior to 1.4.2, the UDM incorrectly converts a downstream 400 Bad Request (from UDR) into a 500 Internal Server Error when handling PATCH requests with an empty supi path parameter. Additionally, the UDM incorrectly translates the PATCH method to PUT when forwarding to UDR, indicating a deeper architectural issue. This leaks internal error handling behavior, making it difficult for clients to distinguish between client-side errors and server-side failures. The issue has been patched in version 1.4.2.
References
Link Resource
https://github.com/free5gc/free5gc/issues/784 Exploit Issue Tracking Patch Vendor Advisory
https://github.com/free5gc/free5gc/security/advisories/GHSA-5rvc-5cwx-g5x8 Patch Vendor Advisory
https://github.com/free5gc/udm/pull/79 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:*

History

23 Mar 2026, 18:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.3

23 Mar 2026, 18:22

Type Values Removed Values Added
First Time Free5gc udm
Free5gc
CPE cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:*
Summary
  • (es) Free5GC es un proyecto de código abierto de la Linux Foundation para redes centrales móviles de quinta generación (5G). En versiones anteriores a la 1.4.2, el UDM convierte incorrectamente un 400 Bad Request descendente (del UDR) en un 500 Internal Server Error al manejar solicitudes PATCH con un parámetro de ruta supi vacío. Además, el UDM traduce incorrectamente el método PATCH a PUT al reenviar al UDR, lo que indica un problema arquitectónico más profundo. Esto filtra el comportamiento interno de manejo de errores, dificultando a los clientes distinguir entre errores del lado del cliente y fallos del lado del servidor. El problema ha sido parcheado en la versión 1.4.2.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/free5gc/free5gc/issues/784 - () https://github.com/free5gc/free5gc/issues/784 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://github.com/free5gc/free5gc/security/advisories/GHSA-5rvc-5cwx-g5x8 - () https://github.com/free5gc/free5gc/security/advisories/GHSA-5rvc-5cwx-g5x8 - Patch, Vendor Advisory
References () https://github.com/free5gc/udm/pull/79 - () https://github.com/free5gc/udm/pull/79 - Issue Tracking, Patch

20 Mar 2026, 09:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 09:16

Updated : 2026-03-23 18:32


NVD link : CVE-2026-33192

Mitre link : CVE-2026-33192

CVE.ORG link : CVE-2026-33192


JSON object : View

Products Affected

free5gc

  • udm
CWE
CWE-209

Generation of Error Message Containing Sensitive Information