{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:28:53.450","vulnerabilities":[{"cve":{"id":"CVE-2025-70123","sourceIdentifier":"cve@mitre.org","published":"2026-02-13T17:16:12.210","lastModified":"2026-02-18T15:40:29.760","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This places the UPF in an inconsistent state where a subsequent valid PFCP Session Establishment Request triggers a cascading failure, disrupting the SMF connection and causing service degradation."},{"lang":"es","value":"Una vulnerabilidad de validación de entrada incorrecta y de cumplimiento de protocolo en free5GC v4.0.1 permite a atacantes remotos causar una denegación de servicio. El UPF acepta incorrectamente una solicitud de configuración de asociación PFCP malformada, violando 3GPP TS 29.244. Esto coloca al UPF en un estado inconsistente donde una solicitud posterior válida de establecimiento de sesión PFCP desencadena un fallo en cascada, interrumpiendo la conexión SMF y causando degradación del servicio."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:free5gc:free5gc:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"685CADC6-6235-4ACC-AB3A-0A0E3E12FA0D"}]}]}],"references":[{"url":"https://github.com/free5gc/free5gc/issues/745","source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Vendor Advisory"]}]}}]}