<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-44330 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44330/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 09 May 2026 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44330/feed.xml" rel="self" type="application/rss+xml"/><item><title>free5GC NEF nnef-pfdmanagement API Unauthenticated Access Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-free5gc-nef-auth-bypass/</link><pubDate>Sat, 09 May 2026 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-free5gc-nef-auth-bypass/</guid><description>free5GC's NEF nnef-pfdmanagement API is vulnerable to unauthenticated access, allowing attackers with network access to read PFD data and create/delete PFD subscriptions by using forged bearer tokens due to the absence of inbound OAuth2/bearer-token authorization.</description><content:encoded><![CDATA[<p>The free5GC Network Exposure Function (NEF) is vulnerable to an unauthenticated access issue within the <code>nnef-pfdmanagement</code> API. The vulnerability, present in versions up to v4.2.1, stems from a missing inbound OAuth2/bearer-token authorization check on the <code>nnef-pfdmanagement</code> route group. This oversight allows any network attacker capable of reaching the NEF on the SBI (Service Based Interface) to bypass authentication using forged bearer tokens. The <code>nnef-pfdmanagement</code> API is intended for production use, as it is declared in the runtime <code>ServiceList</code> and should be protected by OAuth2 authentication. This vulnerability allows attackers to read PFD application data and manipulate PFD change-notification subscriptions without proper authorization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the free5GC NEF SBI (Service Based Interface), typically running on port 8000.</li>
<li>Attacker crafts a malicious HTTP GET request to the <code>/nnef-pfdmanagement/v1/applications</code> endpoint, including a forged or arbitrary bearer token in the <code>Authorization</code> header.</li>
<li>NEF processes the request without proper authentication, querying the UDR (Unified Data Repository) for PFD data.</li>
<li>NEF returns the PFD application data to the attacker, exposing sensitive traffic-classification policies.</li>
<li>Attacker crafts a malicious HTTP POST request to the <code>/nnef-pfdmanagement/v1/subscriptions</code> endpoint with a forged bearer token, including a <code>notifyUri</code> pointing to an attacker-controlled endpoint.</li>
<li>NEF creates the PFD subscription, directing change notifications to the attacker&rsquo;s <code>notifyUri</code>.</li>
<li>Attacker crafts a malicious HTTP DELETE request to <code>/nnef-pfdmanagement/v1/subscriptions/{subID}</code> with a forged bearer token, targeting a legitimate subscription.</li>
<li>NEF deletes the targeted PFD subscription, disrupting legitimate change notifications.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The unauthenticated access vulnerability in free5GC&rsquo;s NEF v4.2.1 allows attackers to read AF-supplied PFD application data, create attacker-controlled PFD change-notification subscriptions, and delete legitimate PFD subscriptions. Successful exploitation can lead to the leakage of traffic-classification policies, turning NEF into an unauthenticated outbound HTTP request source, and disrupting legitimate PFD-update propagation. This vulnerability affects the intended production path for PFD services, posing a critical risk to 5G network operators.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Forged Token Access to free5GC NEF PFD Data</code> to detect unauthorized attempts to access PFD data via the <code>nnef-pfdmanagement</code> API.</li>
<li>Deploy the Sigma rule <code>Detect Forged Token Subscription Manipulation in free5GC NEF</code> to detect unauthorized attempts to create or delete PFD subscriptions via the <code>nnef-pfdmanagement</code> API.</li>
<li>Apply the patch or upgrade to a fixed version of free5GC NEF that addresses CVE-2026-44330.</li>
<li>Monitor network traffic to the NEF SBI (IP address <code>10.100.200.19</code>) for suspicious activity related to the <code>/nnef-pfdmanagement/v1/</code> endpoints listed in the IOC table.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>free5GC</category><category>NEF</category><category>unauthenticated access</category><category>CVE-2026-44330</category><category>PFD management</category><category>network security</category></item></channel></rss>