Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-69247
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-23 Feb, 2026 | 21:38
Updated At-25 Feb, 2026 | 15:30
Rejected At-
▼CVE Numbering Authority (CNA)
free5GC has Heap Buffer Overflow in UPF Leading to Denial of Service

free5GC go-upf is the User Plane Function (UPF) implementation for 5G networks that is part of the free5GC project. Versions prior to 1.2.8 have a Heap-based Buffer Overflow (CWE-122) vulnerability leading to Denial of Service. Remote attackers can crash the UPF network element by sending a specially crafted PFCP Session Modification Request with an invalid SDF Filter length field. This causes a heap buffer overflow, resulting in complete service disruption for all connected UEs and potential cascading failures affecting the SMF. All deployments of free5GC using the UPF component may be affected. Version 1.2.8 of go-upf contains a fix.

Affected Products
Vendor
free5gc
Product
go-upf
Versions
Affected
  • < 1.2.8
Problem Types
TypeCWE IDDescription
CWECWE-122CWE-122: Heap-based Buffer Overflow
Type: CWE
CWE ID: CWE-122
Description: CWE-122: Heap-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
4.02.7LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U
Version: 4.0
Base score: 2.7
Base severity: LOW
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/free5gc/free5gc/security/advisories/GHSA-gf69-93xr-p23g
x_refsource_CONFIRM
https://github.com/free5gc/free5gc/issues/746
x_refsource_MISC
https://github.com/free5gc/go-upf/pull/85
x_refsource_MISC
https://github.com/free5gc/go-upf/commit/b798fe5ee6a984be492fa53958dd5f1305469f85
x_refsource_MISC
Hyperlink: https://github.com/free5gc/free5gc/security/advisories/GHSA-gf69-93xr-p23g
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/free5gc/free5gc/issues/746
Resource:
x_refsource_MISC
Hyperlink: https://github.com/free5gc/go-upf/pull/85
Resource:
x_refsource_MISC
Hyperlink: https://github.com/free5gc/go-upf/commit/b798fe5ee6a984be492fa53958dd5f1305469f85
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found