CVE-2026-27643

5.3 MEDIUM

📋 TL;DR

The free5GC UDR component leaks detailed internal parsing error messages to remote clients through the NEF service. This allows attackers to perform service fingerprinting and gather intelligence about the 5G core network implementation. All deployments using free5GC UDR versions up to 1.4.1 with the Nnef_PfdManagement service enabled are affected.

💻 Affected Systems

Products:
  • free5GC UDR
Versions: Up to and including version 1.4.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the Nnef_PfdManagement service within free5GC UDR component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the exact software version and configuration details, enabling targeted attacks against known vulnerabilities in specific free5GC deployments.

🟠

Likely Case

Information disclosure that reveals internal error handling mechanisms and software stack details, facilitating reconnaissance for future attacks.

🟢

If Mitigated

Limited information leakage with generic error messages that don't reveal implementation details.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed requests to trigger parsing errors, which then leak detailed error messages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.4.1

Vendor Advisory: https://github.com/free5gc/free5gc/security/advisories/GHSA-6468-f87j-6g82

Restart Required: Yes

Instructions:

1. Update free5GC UDR to version after 1.4.1. 2. Apply the patch from pull request #56. 3. Restart the UDR service. 4. Verify error messages no longer contain internal parsing details.

🔧 Temporary Workarounds

No application-level workaround

all

The advisory states there is no direct workaround at the application level. The only solution is to apply the patch.

🧯 If You Can't Patch

  • Implement network-level filtering to restrict access to Nnef_PfdManagement service endpoints
  • Deploy WAF or reverse proxy to sanitize error responses before they reach clients

🔍 How to Verify

Check if Vulnerable:

Send malformed JSON requests to Nnef_PfdManagement endpoints and check if detailed parsing error messages are returned.

Check Version:

Check free5GC UDR version in configuration files or via API endpoints if available.

Verify Fix Applied:

After patching, send malformed requests and verify only generic error messages are returned without internal parsing details.

📡 Detection & Monitoring

Log Indicators:

  • Unusual parsing error patterns in UDR logs
  • Multiple malformed requests to Nnef_PfdManagement endpoints

Network Indicators:

  • Repeated malformed JSON payloads sent to UDR service ports
  • Unusual error response patterns in network traffic

SIEM Query:

source="free5gc-udr" AND (message="parsing error" OR message="invalid character")

🔗 References

📤 Share & Export