Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/free5gc/free5gc/issues/731 |
|
Wed, 07 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc free5gc
|
|
| CPEs | cpe:2.3:a:free5gc:free5gc:4.1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Free5gc free5gc
|
Fri, 19 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-129 | |
| Metrics |
cvssV3_1
|
Fri, 19 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc
Free5gc upf |
|
| Vendors & Products |
Free5gc
Free5gc upf |
Thu, 18 Dec 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests. An unauthenticated remote attacker can send a request with a very large SEID (e.g., 0xFFFFFFFFFFFFFFFF) that causes an integer conversion/underflow in LocalNode.DeleteSess() / LocalNode.Sess() when a uint64 SEID is converted to int and used in index arithmetic. This leads to a negative index into n.sess and a Go runtime panic, resulting in a denial of service (UPF crash). The issue has been reproduced on free5GC v4.1.0 with crashes observed in the session lookup/deletion path in internal/pfcp/node.go; other versions may also be affected. No authentication is required. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-19T18:01:34.231Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65562
Updated: 2025-12-19T17:31:31.168Z
Status : Analyzed
Published: 2025-12-18T19:16:33.747
Modified: 2026-01-07T21:01:21.407
Link: CVE-2025-65562
No data.
OpenCVE Enrichment
Updated: 2025-12-19T09:18:02Z