<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Free5gc — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/free5gc/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 20:01:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/free5gc/feed.xml" rel="self" type="application/rss+xml"/><item><title>free5gc UDR Improper Path Validation Allows Unauthenticated Access to Traffic Influence Subscriptions</title><link>https://feed.craftedsignal.io/briefs/2026-04-free5gc-udr-path-validation/</link><pubDate>Tue, 14 Apr 2026 20:01:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-free5gc-udr-path-validation/</guid><description>An improper path validation vulnerability exists in the free5gc UDR service, allowing unauthenticated attackers with access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions.</description><content:encoded><![CDATA[<p>An improper path validation vulnerability in the free5gc UDR (User Data Repository) service allows unauthenticated attackers with network access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions. The vulnerability, present in versions up to 1.4.2, stems from a missing <code>return</code> statement after an HTTP 404 response is sent for an invalid path. This allows the request to continue processing and return subscription data despite the invalid path. An attacker can exploit this by providing an arbitrary value instead of the expected <code>subs-to-notify</code> path segment in a GET request. Successful exploitation allows the attacker to retrieve sensitive subscriber-related information, impacting deployments where the SBI is reachable by untrusted parties.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable free5GC UDR instance with a reachable SBI.</li>
<li>Attacker creates a Traffic Influence Subscription using a POST request to <code>/nudr-dr/v2/application-data/influenceData/subs-to-notify</code> to obtain a valid <code>subscriptionId</code>.</li>
<li>The UDR service creates and stores the subscription, assigning a unique <code>subscriptionId</code>.</li>
<li>Attacker crafts a GET request to <code>/nudr-dr/v2/application-data/influenceData/{influenceId}/{subscriptionId}</code> with an invalid <code>influenceId</code> (e.g., &ldquo;WRONGID&rdquo;) but the valid <code>subscriptionId</code> obtained in step 2.</li>
<li>The UDR service&rsquo;s <code>HandleApplicationDataInfluenceDataSubsToNotifySubscriptionIdGet</code> function checks if <code>influenceId</code> is not equal to &ldquo;subs-to-notify&rdquo;.</li>
<li>The function incorrectly sends a &ldquo;404 page not found&rdquo; response but fails to terminate the request processing.</li>
<li>The request processing continues, retrieving the subscription data associated with the valid <code>subscriptionId</code>.</li>
<li>The UDR service returns the 404 error message along with the subscription object (containing sensitive information) in the same HTTP response body, disclosing subscriber data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthenticated attackers to retrieve Traffic Influence Subscription objects without proper authorization. Successful exploitation results in the disclosure of sensitive subscriber-related information, including SUPIs/IMSIs, DNNs, S-NSSAIs, and callback notification URI values. This data can be used for further malicious activities such as subscriber tracking or unauthorized service access. Any free5GC deployment with a reachable SBI is potentially impacted. The severity is high due to the ease of exploitation and the sensitivity of the disclosed information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by free5GC, which adds the missing <code>return</code> statement in <code>NFs/udr/internal/sbi/api_datarepository.go</code> to prevent further processing after sending the 404 response.</li>
<li>Monitor webserver logs for GET requests to <code>/nudr-dr/v2/application-data/influenceData/*</code> that return a 404 status code along with a JSON body to detect potential exploitation attempts. Implement a detection rule similar to the &ldquo;Detect free5GC UDR Path Traversal Attempt&rdquo; Sigma rule provided below.</li>
<li>Block the callback notification URI <code>http://evil.com/notify</code> listed in the IOC table at the network or application firewall to prevent potential callback exploitation.</li>
<li>Upgrade the <code>go/github.com/free5gc/udr</code> package to a version greater than 1.4.2 to remediate CVE-2026-40247.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>free5GC</category><category>UDR</category><category>path-validation</category><category>information-disclosure</category></item><item><title>Free5GC AMF Denial-of-Service Vulnerability (CVE-2026-30653)</title><link>https://feed.craftedsignal.io/briefs/2026-03-free5gc-dos/</link><pubDate>Tue, 24 Mar 2026 15:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-free5gc-dos/</guid><description>A remote attacker can exploit CVE-2026-30653 in Free5GC v4.2.0 and earlier by sending crafted requests to the AMF component's HandleAuthenticationFailure function, leading to a denial-of-service condition.</description><content:encoded>&lt;p>Free5GC is an open-source 5G core network implementation. CVE-2026-30653 affects Free5GC versions 4.2.0 and earlier. The vulnerability resides within the Access and Mobility Management Function (AMF) component, specifically in the &lt;code>HandleAuthenticationFailure&lt;/code> function. A remote, unauthenticated attacker can send malicious requests that trigger excessive resource consumption or a crash in the AMF, resulting in a denial-of-service (DoS) condition. This vulnerability was disclosed on March 24…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>free5gc</category><category>denial-of-service</category><category>cve-2026-30653</category><category>amf</category></item></channel></rss>