CVE-2025-65566

7.5 HIGH

📋 TL;DR

A denial-of-service vulnerability in the omec-project UPF's pfcpiface component allows attackers to crash the UPF process by sending malformed PFCP Session Report Response messages missing the mandatory Cause Information Element. This disrupts user-plane services in 5G networks. Organizations running the vulnerable UPF version are affected.

💻 Affected Systems

Products:
  • omec-project UPF (pfcpiface component)
Versions: upf-epc-pfcpiface:2.1.3-dev
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the vulnerable pfcpiface component version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of user-plane services in affected 5G network segments, causing service outages for all connected users.

🟠

Likely Case

Intermittent UPF crashes leading to service degradation and potential network instability.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring allowing quick detection and recovery.

🌐 Internet-Facing: MEDIUM - Requires access to N4/PFCP endpoint which may be exposed in some deployments.
🏢 Internal Only: HIGH - If attacker gains internal network access, exploitation is straightforward.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted PFCP messages to the N4 interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub issue for latest patched version

Vendor Advisory: https://github.com/omec-project/upf/issues/958

Restart Required: Yes

Instructions:

1. Monitor GitHub issue #958 for patch release. 2. Update to patched version. 3. Restart UPF services. 4. Verify fix with test PFCP messages.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to UPF N4/PFCP endpoint to trusted sources only.

iptables -A INPUT -p tcp --dport <pfcp-port> -s <trusted-ips> -j ACCEPT
iptables -A INPUT -p tcp --dport <pfcp-port> -j DROP

🧯 If You Can't Patch

  • Implement strict network ACLs to limit PFCP traffic to authorized SMF nodes only.
  • Deploy monitoring to detect UPF process crashes and implement automated restart mechanisms.

🔍 How to Verify

Check if Vulnerable:

Check UPF version: docker images | grep upf-epc-pfcpiface or check deployment manifests for version 2.1.3-dev.

Check Version:

docker inspect <upf-container> | grep -i version

Verify Fix Applied:

After patching, test with malformed PFCP Session Report Response messages and verify UPF doesn't crash.

📡 Detection & Monitoring

Log Indicators:

  • UPF process panic messages
  • nil pointer dereference errors in logs
  • UPF service restart events

Network Indicators:

  • Unusual PFCP traffic patterns
  • Multiple malformed PFCP Session Report Response messages

SIEM Query:

source="upf.log" AND ("panic" OR "nil pointer" OR "session report handler")

🔗 References

📤 Share & Export