{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-30653/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["free5gc","denial-of-service","cve-2026-30653","amf"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eFree5GC is an open-source 5G core network implementation. CVE-2026-30653 affects Free5GC versions 4.2.0 and earlier. The vulnerability resides within the Access and Mobility Management Function (AMF) component, specifically in the \u003ccode\u003eHandleAuthenticationFailure\u003c/code\u003e function. A remote, unauthenticated attacker can send malicious requests that trigger excessive resource consumption or a crash in the AMF, resulting in a denial-of-service (DoS) condition. This vulnerability was disclosed on March 24…\u003c/p\u003e\n","date_modified":"2026-03-24T15:16:34Z","date_published":"2026-03-24T15:16:34Z","id":"/briefs/2026-03-free5gc-dos/","summary":"A remote attacker can exploit CVE-2026-30653 in Free5GC v4.2.0 and earlier by sending crafted requests to the AMF component's HandleAuthenticationFailure function, leading to a denial-of-service condition.","title":"Free5GC AMF Denial-of-Service Vulnerability (CVE-2026-30653)","url":"https://feed.craftedsignal.io/briefs/2026-03-free5gc-dos/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-30653","version":"https://jsonfeed.org/version/1.1"}