Vulnerability Description
free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Free5Gc | Go-Upf | <= 1.2.6 |
| Free5Gc | Smf | <= 1.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/free5gc/free5gc/issues/745ExploitIssue TrackingVendor Advisory
- https://github.com/free5gc/free5gc/security/advisories/GHSA-8m42-qw58-8362Vendor Advisory
FAQ
What is CVE-2025-69232?
CVE-2025-69232 is a vulnerability with a CVSS score of 7.5 (HIGH). free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Impro...
How severe is CVE-2025-69232?
CVE-2025-69232 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-69232?
Check the references section above for vendor advisories and patch information. Affected products include: Free5Gc Go-Upf, Free5Gc Smf.