Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:free5gc:nrf:1.4.0:*:*:*:*:*:*:* |
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc
Free5gc nrf |
|
| Vendors & Products |
Free5gc
Free5gc nrf |
Fri, 23 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-863 | |
| Metrics |
cvssV3_1
|
Fri, 23 Jan 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the AccessTokenScopeCheck() function in file internal/sbi/processor/access_token.go bypasses all scope validation when the attacker uses a crafted targetNF value. This allows attackers to obtain an access token with any arbitrary scope. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-23T19:24:55.108Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66719
Updated: 2026-01-23T19:23:58.718Z
Status : Analyzed
Published: 2026-01-23T16:15:51.220
Modified: 2026-02-11T19:55:25.293
Link: CVE-2025-66719
No data.
OpenCVE Enrichment
Updated: 2026-01-26T11:54:37Z