free5GC has Improper Input Validation in UDM UEAU Service
Description
free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the supi parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system-level error details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UEAU service may be affected. free5gc/udm pull request 75 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
Affected products
2- free5gc/udmv5Range: <= 1.4.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/free5gc/free5gc/issues/749mitrex_refsource_MISC
- github.com/free5gc/free5gc/security/advisories/GHSA-h4wg-rp7m-8xx4mitrex_refsource_CONFIRM
- github.com/free5gc/udm/commit/a7af2321ddea6368c43835f90f6d1b9d67dd2ea1mitrex_refsource_MISC
- github.com/free5gc/udm/pull/75mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.