CVE-2025-69232

Source
https://cve.org/CVERecord?id=CVE-2025-69232
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-69232.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-69232
Aliases
  • GHSA-8m42-qw58-8362
Published
2026-02-23T21:27:51.587Z
Modified
2026-02-28T04:45:42.760691Z
Severity
  • 2.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
free5GC hasProtocol Compliance Violation in UPF Leading to SMF Service Disruption
Details

free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.

Database specific
{
    "cwe_ids": [
        "CWE-20"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/69xxx/CVE-2025-69232.json"
}
References

Affected packages

Git / github.com/free5gc/smf

Affected ranges

Type
GIT
Repo
https://github.com/free5gc/smf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v1.*
v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.2.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-69232.json"