Description
free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics due to nil pointer dereference and the SMF process terminates. This is triggered by a malformed PFCP SessionReportRequest on the SMF PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).
INFO
Published Date :
2026-02-24T00:10:10.106Z
Last Modified :
2026-02-26T14:28:02.807Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-25501 vulnerability.
| Vendors | Products |
|---|---|
| Free5gc |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25501.