CVE-2026-1974
📋 TL;DR
A denial-of-service vulnerability exists in Free5GC's SMF component where the ResolveNodeIdToIp function can be manipulated by remote attackers. This affects Free5GC deployments up to version 4.1.0, potentially disrupting 5G core network services. The vulnerability is remotely exploitable and has a publicly available exploit.
💻 Affected Systems
- Free5GC
📦 What is this software?
Free5gc by Free5gc
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of SMF functionality leading to service unavailability for affected 5G network slices and subscribers.
Likely Case
Intermittent service degradation or temporary unavailability of specific network functions.
If Mitigated
Minimal impact with proper network segmentation and rate limiting in place.
🎯 Exploit Status
Exploit is publicly available on GitHub and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.1.1 or later
Vendor Advisory: https://github.com/free5gc/free5gc/issues/816
Restart Required: Yes
Instructions:
1. Update Free5GC to version 4.1.1 or later. 2. Apply the patch from GitHub PR #189. 3. Restart the SMF service.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict access to SMF component to trusted networks only
iptables -A INPUT -p tcp --dport <smf_port> -s <trusted_network> -j ACCEPT
iptables -A INPUT -p tcp --dport <smf_port> -j DROP
Rate Limiting
linuxImplement rate limiting on SMF service endpoints
iptables -A INPUT -p tcp --dport <smf_port> -m limit --limit 10/minute --limit-burst 20 -j ACCEPT
🧯 If You Can't Patch
- Implement strict network access controls to isolate SMF from untrusted networks
- Deploy Web Application Firewall (WAF) or network filtering to block malicious traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check Free5GC version: if version <= 4.1.0 and SMF is running, system is vulnerable.
Check Version:
free5gc version
Verify Fix Applied:
Verify Free5GC version is >= 4.1.1 and check that GitHub PR #189 changes are applied to datapath.go
📡 Detection & Monitoring
Log Indicators:
- Unusual volume of requests to SMF ResolveNodeIdToIp endpoint
- SMF service crashes or restarts
Network Indicators:
- High volume of malformed requests to SMF port
- Traffic patterns indicating DoS attempts
SIEM Query:
source="free5gc" AND ("ResolveNodeIdToIp" OR "SMF crash")