CVE-2026-1976

5.3 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in Free5GC's SMF component allows remote attackers to cause denial of service by exploiting the SessionDeletionResponse function. This affects Free5GC deployments up to version 4.1.0. The vulnerability is remotely exploitable and a public exploit exists.

💻 Affected Systems

Products:
  • Free5GC
Versions: up to 4.1.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects SMF (Session Management Function) component specifically. Requires SMF to be exposed to untrusted traffic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of the SMF component, potentially affecting 5G core network functionality and causing service outages for connected devices.

🟠

Likely Case

Denial of service affecting the SMF component, leading to session management failures and degraded network performance.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially causing only isolated service interruptions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and the vulnerability requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.1 or later

Vendor Advisory: https://github.com/free5gc/free5gc/issues/817

Restart Required: Yes

Instructions:

1. Update Free5GC to version 4.1.1 or later. 2. Apply the patch from GitHub pull request #189. 3. Restart the SMF service.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to SMF component to trusted networks only

iptables -A INPUT -p tcp --dport <smf_port> -s <trusted_network> -j ACCEPT
iptables -A INPUT -p tcp --dport <smf_port> -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit SMF exposure
  • Deploy intrusion detection/prevention systems to monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check Free5GC version: if version <= 4.1.0, system is vulnerable

Check Version:

free5gc version

Verify Fix Applied:

Verify Free5GC version is 4.1.1 or later and check that GitHub pull request #189 changes are applied

📡 Detection & Monitoring

Log Indicators:

  • SMF service crashes
  • Null pointer exception logs in SMF component
  • Unusual session deletion requests

Network Indicators:

  • Multiple malformed session deletion requests to SMF port
  • Traffic patterns matching known exploit

SIEM Query:

source="free5gc" AND ("null pointer" OR "SessionDeletionResponse" OR "SMF crash")

🔗 References

📤 Share & Export