The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests. An unauthenticated remote attacker can send a request with a very large SEID (e.g., 0xFFFFFFFFFFFFFFFF) that causes an integer conversion/underflow in LocalNode.DeleteSess() / LocalNode.Sess() when a uint64 SEID is converted to int and used in index arithmetic. This leads to a negative index into n.sess and a Go runtime panic, resulting in a denial of service (UPF crash). The issue has been reproduced on free5GC v4.1.0 with crashes observed in the session lookup/deletion path in internal/pfcp/node.go; other versions may also be affected. No authentication is required.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 08 Jan 2026 06:15:00 +0900

Type Values Removed Values Added
First Time appeared Free5gc free5gc
CPEs cpe:2.3:a:free5gc:free5gc:4.1.0:*:*:*:*:*:*:*
Vendors & Products Free5gc free5gc

Sat, 20 Dec 2025 03:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-129
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 19 Dec 2025 18:30:00 +0900

Type Values Removed Values Added
First Time appeared Free5gc
Free5gc upf
Vendors & Products Free5gc
Free5gc upf

Fri, 19 Dec 2025 04:00:00 +0900

Type Values Removed Values Added
Description The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests. An unauthenticated remote attacker can send a request with a very large SEID (e.g., 0xFFFFFFFFFFFFFFFF) that causes an integer conversion/underflow in LocalNode.DeleteSess() / LocalNode.Sess() when a uint64 SEID is converted to int and used in index arithmetic. This leads to a negative index into n.sess and a Go runtime panic, resulting in a denial of service (UPF crash). The issue has been reproduced on free5GC v4.1.0 with crashes observed in the session lookup/deletion path in internal/pfcp/node.go; other versions may also be affected. No authentication is required.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-19T18:01:34.231Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65562

cve-icon Vulnrichment

Updated: 2025-12-19T17:31:31.168Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-18T19:16:33.747

Modified: 2026-01-07T21:01:21.407

Link: CVE-2025-65562

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-19T18:18:02Z

Weaknesses