CVE-2025-65562
📋 TL;DR
CVE-2025-65562 is an unauthenticated denial-of-service vulnerability in free5GC UPF where specially crafted PFCP Session Deletion Requests with large SEID values cause integer underflow and runtime crashes. This affects organizations using free5GC for 5G core network functions, allowing remote attackers to disrupt UPF services without authentication.
💻 Affected Systems
- free5GC UPF
📦 What is this software?
Free5gc by Free5gc
⚠️ Risk & Real-World Impact
Worst Case
Sustained attacks could cause repeated UPF crashes, leading to extended service outages for 5G data plane functions and disruption of user connectivity.
Likely Case
Intermittent UPF crashes causing service disruptions, requiring manual restarts and potentially affecting 5G network reliability.
If Mitigated
With proper network segmentation and filtering, impact is limited to isolated network segments with minimal service disruption.
🎯 Exploit Status
The vulnerability is straightforward to exploit with basic network access to the UPF PFCP interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check GitHub issue #731 for latest patched version
Vendor Advisory: https://github.com/free5gc/free5gc/issues/731
Restart Required: Yes
Instructions:
1. Monitor free5GC GitHub repository for patches. 2. Apply the patch to internal/pfcp/node.go. 3. Rebuild and restart free5GC UPF component.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict PFCP interface access to trusted N4 interface peers only
iptables -A INPUT -p udp --dport 8805 -s <trusted_peer> -j ACCEPT
iptables -A INPUT -p udp --dport 8805 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate UPF from untrusted networks
- Deploy network intrusion prevention systems to detect and block malicious PFCP packets
🔍 How to Verify
Check if Vulnerable:
Check if free5GC UPF crashes when receiving PFCP Session Deletion Request with SEID 0xFFFFFFFFFFFFFFFF
Check Version:
Check free5GC version in deployment configuration or build information
Verify Fix Applied:
Test with malicious SEID values and verify UPF remains stable without panic
📡 Detection & Monitoring
Log Indicators:
- Go runtime panic messages in free5GC logs
- UPF process crashes and restarts
- PFCP session deletion errors
Network Indicators:
- Unusual PFCP Session Deletion Requests with maximum SEID values
- Traffic spikes to UPF PFCP port 8805
SIEM Query:
source="free5gc.logs" AND "panic" AND "DeleteSess" OR source="free5gc.logs" AND "runtime error"