A vulnerability was determined in Free5GC up to 4.1.0. The impacted element is the function establishPfcpSession of the component SMF. Executing a manipulation can lead to null pointer dereference. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. It is best practice to apply a patch to resolve this issue.
References
| Link | Resource |
|---|---|
| https://github.com/free5gc/free5gc/ | Product |
| https://github.com/free5gc/free5gc/issues/815 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/free5gc/free5gc/issues/815#issue-3832032062 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/free5gc/smf/pull/189 | Issue Tracking |
| https://vuldb.com/?ctiid.344495 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344495 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.743236 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-06 02:16
Updated : 2026-02-09 15:48
NVD link : CVE-2026-1973
Mitre link : CVE-2026-1973
CVE.ORG link : CVE-2026-1973
JSON object : View
Products Affected
free5gc
- free5gc
