free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).
References
| Link | Resource |
|---|---|
| https://github.com/free5gc/free5gc/issues/807 | Exploit Issue Tracking |
| https://github.com/free5gc/free5gc/security/advisories/GHSA-vw8r-p7h3-g3xh | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-24 01:16
Updated : 2026-02-25 16:28
NVD link : CVE-2026-26025
Mitre link : CVE-2026-26025
CVE.ORG link : CVE-2026-26025
JSON object : View
Products Affected
free5gc
- smf
CWE
CWE-476
NULL Pointer Dereference
