<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>5g — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/5g/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/5g/feed.xml" rel="self" type="application/rss+xml"/><item><title>Free5GC PCF Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-free5gc-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-free5gc-auth-bypass/</guid><description>Free5GC PCF versions prior to 1.4.3 are vulnerable to an authentication bypass due to missing middleware, allowing unauthenticated access to SM policy handlers and disclosure of subscriber SUPI.</description><content:encoded><![CDATA[<p>Free5GC PCF (Policy Control Function) versions prior to 1.4.3 contain an authentication bypass vulnerability (CVE-2026-42083) in the Npcf_SMPolicyControl service. The vulnerability stems from the absence of router authorization middleware for the <code>smPolicyGroup</code> route, allowing unauthenticated requests to reach sensitive SM policy handlers. An attacker able to reach the PCF SBI interface can directly invoke these handlers, potentially gaining access to subscriber identifiers including SUPI (Subscriber Permanent Identifier) and other policy context data. This issue was resolved in free5gc/pcf PR #63 by adding <code>RouterAuthorizationCheck</code> to <code>smPolicyGroup</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Free5GC PCF instance running a version prior to 1.4.3.</li>
<li>The attacker gains network access to the PCF SBI (Service Based Interface).</li>
<li>The attacker sends an unauthenticated HTTP POST request to <code>/npcf-smpolicycontrol/v1/sm-policies</code> to create a new SM policy.</li>
<li>The PCF, lacking proper authentication, processes the request without verifying the attacker&rsquo;s identity.</li>
<li>The attacker sends an unauthenticated HTTP GET request to <code>/npcf-smpolicycontrol/v1/sm-policies/{smPolicyId}</code> to retrieve the newly created policy.</li>
<li>The PCF returns the policy context, which may contain sensitive subscriber identifiers such as <code>supi</code>.</li>
<li>The attacker exploits this vulnerability to gain unauthorized access to subscriber information and manipulate SM policies.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This authentication bypass vulnerability allows unauthorized access to subscriber data and policy control functions within the 5G core network. If exploited, an attacker could potentially gain access to sensitive subscriber information, disrupt network services, or manipulate policy settings. Successful exploitation allows unauthorized actors to invoke Npcf_SMPolicyControl handlers directly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Free5GC PCF to version 1.4.3 or later to patch CVE-2026-42083.</li>
<li>Deploy the Sigma rule <code>Detect Unauthenticated PCF SM Policy Access</code> to identify unauthenticated requests to the vulnerable endpoints.</li>
<li>Implement network segmentation to restrict access to the PCF SBI interface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>5g</category><category>pcf</category></item></channel></rss>