Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5rvc-5cwx-g5x8 | free5GC UDM incorrectly returns 500 for empty supi path parameter in PATCH sdm-subscriptions reques |
Mon, 23 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 23 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc udm
|
|
| CPEs | cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Free5gc udm
|
|
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free5gc
Free5gc free5gc |
|
| Vendors & Products |
Free5gc
Free5gc free5gc |
Fri, 20 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. In versions prior to 1.4.2, the UDM incorrectly converts a downstream 400 Bad Request (from UDR) into a 500 Internal Server Error when handling PATCH requests with an empty supi path parameter. Additionally, the UDM incorrectly translates the PATCH method to PUT when forwarding to UDR, indicating a deeper architectural issue. This leaks internal error handling behavior, making it difficult for clients to distinguish between client-side errors and server-side failures. The issue has been patched in version 1.4.2. | |
| Title | free5GC UDM incorrectly returns 500 for empty supi path parameter in PATCH sdm-subscriptions reques | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T12:21:06.644Z
Reserved: 2026-03-17T22:16:36.721Z
Link: CVE-2026-33192
Updated: 2026-03-20T12:20:12.615Z
Status : Analyzed
Published: 2026-03-20T09:16:16.230
Modified: 2026-03-23T18:32:46.770
Link: CVE-2026-33192
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:56Z
Github GHSA