Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:free5gc:smf:*:*:*:*:*:go:*:* | |
| Metrics |
cvssV3_1
|
Tue, 24 Feb 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc
Free5gc smf |
|
| Vendors & Products |
Free5gc
Free5gc smf |
Tue, 24 Feb 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only). | |
| Title | free5GC SMF crash (nil pointer dereference) on PFCP SessionReportRequest when ReportType.USAR=1 and UsageReport omits mandatory URRID sub-IE  | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T14:31:19.868Z
Reserved: 2026-02-09T21:36:29.555Z
Link: CVE-2026-26025
Updated: 2026-02-26T14:31:09.892Z
Status : Analyzed
Published: 2026-02-24T01:16:15.237
Modified: 2026-02-25T16:28:24.257
Link: CVE-2026-26025
No data.
OpenCVE Enrichment
Updated: 2026-04-17T16:15:22Z