{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T22:42:15.779","vulnerabilities":[{"cve":{"id":"CVE-2025-69208","sourceIdentifier":"security-advisories@github.com","published":"2026-02-23T22:16:20.717","lastModified":"2026-02-25T15:49:27.880","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. Versions prior to 1.4.1 contain an Improper Error Handling vulnerability with Information Exposure. All deployments of free5GC using the Nnef_PfdManagement service may be affected. The NEF component reliably leaks internal parsing errors (e.g., invalid character 'n' after top-level value) to remote clients. This can aid attackers in fingerprinting server software and logic flows. Version 1.4.1 fixes the issue. There is no direct workaround at the application level. The recommended mitigation is to apply the provided patch."},{"lang":"es","value":"free5GC UDR es el repositorio de datos de usuario (UDR) para free5GC, un proyecto de código abierto para redes móviles de núcleo de quinta generación (5G). Las versiones anteriores a la 1.4.1 contienen una vulnerabilidad de Manejo Inadecuado de Errores con Exposición de Información. Todas las implementaciones de free5GC que utilizan el servicio Nnef_PfdManagement pueden verse afectadas. El componente NEF filtra de forma fiable errores de análisis internos (p. ej., carácter no válido 'n' después del valor de nivel superior) a clientes remotos. Esto puede ayudar a los atacantes a identificar el software del servidor y los flujos lógicos. La versión 1.4.1 corrige el problema. No existe una solución alternativa directa a nivel de aplicación. La mitigación recomendada es aplicar el parche proporcionado."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"UNREPORTED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:free5gc:udr:*:*:*:*:*:go:*:*","versionEndIncluding":"1.4.1","matchCriteriaId":"A300D117-4FF5-4D72-8628-3BA0188B845E"}]}]}],"references":[{"url":"https://github.com/free5gc/free5gc/issues/753","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://github.com/free5gc/free5gc/security/advisories/GHSA-f3pc-w7jp-4jh2","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/free5gc/udr/commit/91bb34bd96e1c89b3fddca80db8b90049da61ebb","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/free5gc/udr/pull/56","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]}]}}]}