<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-44329 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44329/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 09 May 2026 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44329/feed.xml" rel="self" type="application/rss+xml"/><item><title>free5GC SMF Unauthenticated UPI Access</title><link>https://feed.craftedsignal.io/briefs/2026-05-free5gc-smf-auth-bypass/</link><pubDate>Sat, 09 May 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-free5gc-smf-auth-bypass/</guid><description>free5GC's Session Management Function (SMF) UPI interface lacks authentication, allowing unauthenticated network attackers to read/write/delete UP-node and link topology data via exposed APIs.</description><content:encoded><![CDATA[<p>free5GC&rsquo;s Session Management Function (SMF) is vulnerable to an authentication bypass in its UPI (UP-node and link topology management) interface. The UPI route group is mounted without OAuth2/bearer-token authorization middleware, which allows any network attacker who can reach the SMF on the SBI interface to access UPI endpoints without providing any credentials. This vulnerability allows attackers to read the SMF&rsquo;s view of the UP-plane topology, inject attacker-controlled UPF nodes and links, and delete existing entries. The vulnerability affects free5GC SMF versions prior to 1.4.3 and was validated against the <code>free5gc/smf:v4.2.0</code> Docker image from the official Docker compose lab. The vulnerability was addressed in <a href="https://github.com/free5gc/smf/pull/197">https://github.com/free5gc/smf/pull/197</a>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies the SMF instance on the SBI network at 10.100.200.6:8000.</li>
<li>The attacker sends an HTTP GET request to <code>/upi/v1/upNodesLinks</code> without an <code>Authorization</code> header to enumerate existing UPF nodes and links.</li>
<li>The SMF server responds with a <code>200 OK</code> status code and the current UP-node and link topology data.</li>
<li>The attacker crafts a malicious JSON payload containing attacker-controlled UPF node and link information.</li>
<li>The attacker sends an HTTP POST request to <code>/upi/v1/upNodesLinks</code> with the malicious JSON payload and without an <code>Authorization</code> header.</li>
<li>The SMF server processes the request and injects the attacker-controlled UPF node and link entries, returning a <code>200 OK</code> status code.</li>
<li>The attacker can then send a DELETE request to <code>/upi/v1/upNodesLinks/{nodeID}</code> to delete named UPF entries, even with a forged <code>Authorization</code> header.</li>
<li>The SMF server deletes the specified UPF entry, disrupting legitimate UPF participation in SMF&rsquo;s selection logic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to fully compromise the integrity of the SMF&rsquo;s view of the UP-plane topology. This can lead to the injection of rogue UPF nodes, redirection of traffic through attacker-controlled infrastructure, and denial of service by deleting legitimate UPF entries. Given the core functionality of the SMF in a 5G network, this vulnerability could have a significant impact on network availability, security, and performance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch available at <a href="https://github.com/free5gc/smf/pull/197">https://github.com/free5gc/smf/pull/197</a> to upgrade to SMF version 1.4.3 or later to remediate CVE-2026-44329.</li>
<li>Monitor webserver logs for HTTP requests to the <code>/upi/v1/upNodesLinks</code> endpoint without an <code>Authorization</code> header using the &ldquo;Detect Unauthenticated SMF UPI Access&rdquo; Sigma rule.</li>
<li>Inspect network traffic for POST requests to <code>/upi/v1/upNodesLinks</code> containing suspicious or unexpected UPF node configurations.</li>
<li>Implement network segmentation to restrict access to the SMF SBI interface to only authorized and authenticated clients, mitigating the risk of unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>5G</category><category>Authentication Bypass</category><category>free5GC</category><category>SMF</category><category>UPI</category><category>CVE-2026-44329</category></item></channel></rss>