CVE-2025-69250

Source
https://cve.org/CVERecord?id=CVE-2025-69250
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-69250.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-69250
Aliases
  • GHSA-6w77-5pqh-83rm
Published
2026-02-23T23:45:02.681Z
Modified
2026-02-27T00:37:27.404660Z
Severity
  • 6.6 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
free5GC has Improper Error Handling in UDM, Leading to Information Exposure
Details

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt parsing errors) to remote clients when processing invalid pduSessionId inputs. This exposes implementation details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM DELETE service may be vulnerable. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

Database specific
{
    "cwe_ids": [
        "CWE-20",
        "CWE-754"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/69xxx/CVE-2025-69250.json"
}
References

Affected packages

Git / github.com/free5gc/udm

Affected ranges

Type
GIT
Repo
https://github.com/free5gc/udm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.3.0
v1.3.1
v1.3.2
v1.4.0
v1.4.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-69250.json"