<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>UDR — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/udr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 20:01:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/udr/feed.xml" rel="self" type="application/rss+xml"/><item><title>free5gc UDR Improper Path Validation Allows Unauthenticated Access to Traffic Influence Subscriptions</title><link>https://feed.craftedsignal.io/briefs/2026-04-free5gc-udr-path-validation/</link><pubDate>Tue, 14 Apr 2026 20:01:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-free5gc-udr-path-validation/</guid><description>An improper path validation vulnerability exists in the free5gc UDR service, allowing unauthenticated attackers with access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions.</description><content:encoded><![CDATA[<p>An improper path validation vulnerability in the free5gc UDR (User Data Repository) service allows unauthenticated attackers with network access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions. The vulnerability, present in versions up to 1.4.2, stems from a missing <code>return</code> statement after an HTTP 404 response is sent for an invalid path. This allows the request to continue processing and return subscription data despite the invalid path. An attacker can exploit this by providing an arbitrary value instead of the expected <code>subs-to-notify</code> path segment in a GET request. Successful exploitation allows the attacker to retrieve sensitive subscriber-related information, impacting deployments where the SBI is reachable by untrusted parties.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable free5GC UDR instance with a reachable SBI.</li>
<li>Attacker creates a Traffic Influence Subscription using a POST request to <code>/nudr-dr/v2/application-data/influenceData/subs-to-notify</code> to obtain a valid <code>subscriptionId</code>.</li>
<li>The UDR service creates and stores the subscription, assigning a unique <code>subscriptionId</code>.</li>
<li>Attacker crafts a GET request to <code>/nudr-dr/v2/application-data/influenceData/{influenceId}/{subscriptionId}</code> with an invalid <code>influenceId</code> (e.g., &ldquo;WRONGID&rdquo;) but the valid <code>subscriptionId</code> obtained in step 2.</li>
<li>The UDR service&rsquo;s <code>HandleApplicationDataInfluenceDataSubsToNotifySubscriptionIdGet</code> function checks if <code>influenceId</code> is not equal to &ldquo;subs-to-notify&rdquo;.</li>
<li>The function incorrectly sends a &ldquo;404 page not found&rdquo; response but fails to terminate the request processing.</li>
<li>The request processing continues, retrieving the subscription data associated with the valid <code>subscriptionId</code>.</li>
<li>The UDR service returns the 404 error message along with the subscription object (containing sensitive information) in the same HTTP response body, disclosing subscriber data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthenticated attackers to retrieve Traffic Influence Subscription objects without proper authorization. Successful exploitation results in the disclosure of sensitive subscriber-related information, including SUPIs/IMSIs, DNNs, S-NSSAIs, and callback notification URI values. This data can be used for further malicious activities such as subscriber tracking or unauthorized service access. Any free5GC deployment with a reachable SBI is potentially impacted. The severity is high due to the ease of exploitation and the sensitivity of the disclosed information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by free5GC, which adds the missing <code>return</code> statement in <code>NFs/udr/internal/sbi/api_datarepository.go</code> to prevent further processing after sending the 404 response.</li>
<li>Monitor webserver logs for GET requests to <code>/nudr-dr/v2/application-data/influenceData/*</code> that return a 404 status code along with a JSON body to detect potential exploitation attempts. Implement a detection rule similar to the &ldquo;Detect free5GC UDR Path Traversal Attempt&rdquo; Sigma rule provided below.</li>
<li>Block the callback notification URI <code>http://evil.com/notify</code> listed in the IOC table at the network or application firewall to prevent potential callback exploitation.</li>
<li>Upgrade the <code>go/github.com/free5gc/udr</code> package to a version greater than 1.4.2 to remediate CVE-2026-40247.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>free5GC</category><category>UDR</category><category>path-validation</category><category>information-disclosure</category></item></channel></rss>