{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T08:37:59.234","vulnerabilities":[{"cve":{"id":"CVE-2025-69253","sourceIdentifier":"security-advisories@github.com","published":"2026-02-24T01:16:11.913","lastModified":"2026-02-25T16:39:41.997","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Information Exposure. The NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be vulnerable. free5gc/udr pull request 56 contains a patch. No direct workaround is available at the application level. Applying the official patch is recommended."},{"lang":"es","value":"free5GC es un proyecto de código abierto para redes de núcleo móvil de quinta generación (5G). Las versiones hasta e incluyendo la 1.4.1 del Repositorio de Datos de Usuario están afectadas por Manejo Inadecuado de Errores con Exposición de Información. El componente NEF filtra de forma fiable detalles internos de errores de análisis (p. ej., carácter no válido 'n' después del valor de nivel superior) a clientes remotos, lo que puede ayudar a los atacantes en la huella digital del servicio. Todas las implementaciones de free5GC que utilizan el servicio Nnef_PfdManagement pueden ser vulnerables. La solicitud de extracción 56 de free5gc/udr contiene un parche. No hay una solución alternativa directa disponible a nivel de aplicación. Se recomienda aplicar el parche oficial."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"UNREPORTED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:free5gc:udr:*:*:*:*:*:go:*:*","versionEndIncluding":"1.4.1","matchCriteriaId":"A300D117-4FF5-4D72-8628-3BA0188B845E"}]}]}],"references":[{"url":"https://github.com/free5gc/free5gc/issues/753","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/free5gc/free5gc/security/advisories/GHSA-cj2h-x8qm-xgwc","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/free5gc/udr/commit/754d23b03755ad59077ed529ce3b971e477080c4","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/free5gc/udr/pull/56","source":"security-advisories@github.com","tags":["Issue Tracking","Vendor Advisory","Patch"]}]}}]}