Skip to content
Threat Feed
critical advisory

free5GC SMF Unauthenticated UPI Access

free5GC's Session Management Function (SMF) UPI interface lacks authentication, allowing unauthenticated network attackers to read/write/delete UP-node and link topology data via exposed APIs.

free5GC’s Session Management Function (SMF) is vulnerable to an authentication bypass in its UPI (UP-node and link topology management) interface. The UPI route group is mounted without OAuth2/bearer-token authorization middleware, which allows any network attacker who can reach the SMF on the SBI interface to access UPI endpoints without providing any credentials. This vulnerability allows attackers to read the SMF’s view of the UP-plane topology, inject attacker-controlled UPF nodes and links, and delete existing entries. The vulnerability affects free5GC SMF versions prior to 1.4.3 and was validated against the free5gc/smf:v4.2.0 Docker image from the official Docker compose lab. The vulnerability was addressed in https://github.com/free5gc/smf/pull/197.

Attack Chain

  1. An attacker identifies the SMF instance on the SBI network at 10.100.200.6:8000.
  2. The attacker sends an HTTP GET request to /upi/v1/upNodesLinks without an Authorization header to enumerate existing UPF nodes and links.
  3. The SMF server responds with a 200 OK status code and the current UP-node and link topology data.
  4. The attacker crafts a malicious JSON payload containing attacker-controlled UPF node and link information.
  5. The attacker sends an HTTP POST request to /upi/v1/upNodesLinks with the malicious JSON payload and without an Authorization header.
  6. The SMF server processes the request and injects the attacker-controlled UPF node and link entries, returning a 200 OK status code.
  7. The attacker can then send a DELETE request to /upi/v1/upNodesLinks/{nodeID} to delete named UPF entries, even with a forged Authorization header.
  8. The SMF server deletes the specified UPF entry, disrupting legitimate UPF participation in SMF’s selection logic.

Impact

Successful exploitation of this vulnerability allows an unauthenticated attacker to fully compromise the integrity of the SMF’s view of the UP-plane topology. This can lead to the injection of rogue UPF nodes, redirection of traffic through attacker-controlled infrastructure, and denial of service by deleting legitimate UPF entries. Given the core functionality of the SMF in a 5G network, this vulnerability could have a significant impact on network availability, security, and performance.

Recommendation

  • Apply the patch available at https://github.com/free5gc/smf/pull/197 to upgrade to SMF version 1.4.3 or later to remediate CVE-2026-44329.
  • Monitor webserver logs for HTTP requests to the /upi/v1/upNodesLinks endpoint without an Authorization header using the “Detect Unauthenticated SMF UPI Access” Sigma rule.
  • Inspect network traffic for POST requests to /upi/v1/upNodesLinks containing suspicious or unexpected UPF node configurations.
  • Implement network segmentation to restrict access to the SMF SBI interface to only authorized and authenticated clients, mitigating the risk of unauthorized access.

Detection coverage 2

Detect Unauthenticated SMF UPI Access

critical

Detects CVE-2026-44329 exploitation — HTTP requests to the /upi/v1/upNodesLinks endpoint without an Authorization header indicating a potential authentication bypass attempt

sigma tactics: initial_access techniques: T1190 sources: webserver

Detect SMF UPI POST Requests with Suspicious UPF Node Data

high

Detects suspicious POST requests to the SMF UPI endpoint that could indicate an attempt to inject malicious UPF node data. Focuses on unusual IP addresses in the nodeID field.

sigma tactics: initial_access techniques: T1190 sources: webserver

Detection queries are available on the platform. Get full rules →

Indicators of compromise

2

url

TypeValue
urlhttp://10.100.200.6:8000/upi/v1/upNodesLinks
urlhttp://10.100.200.6:8000/nsmf-oam/v1/