CVE-2026-1975

5.3 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in Free5GC's pfcp_reports.go allows remote attackers to cause denial of service by triggering the identityTriggerType function. This affects all Free5GC deployments up to version 4.1.0 that use the vulnerable component.

💻 Affected Systems

Products:
  • Free5GC
Versions: Up to and including 4.1.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects deployments using the vulnerable pfcp_reports.go component. The vulnerability is in the SMF (Session Management Function) module.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the Free5GC core network function, potentially affecting all connected 5G devices and services.

🟠

Likely Case

Service instability or crashes of the affected Free5GC component, leading to partial 5G service disruption.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub issues and pull requests. Remote exploitation without authentication is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.1.0 or patched versions referenced in GitHub PR #189

Vendor Advisory: https://github.com/free5gc/free5gc/issues/814

Restart Required: Yes

Instructions:

1. Update Free5GC to a version that includes the fix from GitHub PR #189. 2. Apply the specific patch to pfcp_reports.go if using older versions. 3. Restart the Free5GC SMF service.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to Free5GC SMF component to trusted sources only

iptables -A INPUT -p tcp --dport [SMF_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [SMF_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to the vulnerable component
  • Deploy monitoring and alerting for abnormal SMF process behavior or crashes

🔍 How to Verify

Check if Vulnerable:

Check Free5GC version and verify if pfcp_reports.go contains the vulnerable identityTriggerType function without null pointer checks

Check Version:

free5gc version | grep -i version

Verify Fix Applied:

Verify the patch from GitHub PR #189 is applied to pfcp_reports.go and check for proper null pointer handling

📡 Detection & Monitoring

Log Indicators:

  • SMF process crashes
  • Null pointer exception logs in Free5GC logs
  • Abnormal termination of pfcp_reports.go related processes

Network Indicators:

  • Unexpected traffic patterns to SMF ports
  • Multiple connection attempts triggering the vulnerable function

SIEM Query:

source="free5gc.logs" AND ("null pointer" OR "panic" OR "crash") AND process="smf"

🔗 References

📤 Share & Export