Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33065— free5GC UDM incorrectly returns 500 for empty supi path parameter in DELETE sdm-subscriptions request

EPSS 0.05% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-33065

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
free5GC UDM incorrectly returns 500 for empty supi path parameter in DELETE sdm-subscriptions request
Source: NVD (National Vulnerability Database)
Vulnerability Description
Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. In versions prior to 1.4.2, the UDM incorrectly converts a downstream 400 Bad Request (from UDR) into a 500 Internal Server Error when handling DELETE requests with an empty supi path parameter. This leaks internal error handling behavior and makes it difficult for clients to distinguish between client-side errors and server-side failures. When a client sends a DELETE request with an empty supi (e.g., double slashes // in URL path), the UDM forwards the malformed request to UDR, which correctly returns 400. However, UDM propagates this as 500 SYSTEM_FAILURE instead of returning the appropriate 400 error to the client. This violates REST API best practices for DELETE operations. The issue has been patched in version 1.4.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过错误消息导致的信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
free5GC 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
free5GC是free5GC开源的一个第 5 代 (5G) 移动核心网络的开源项目。 free5GC 1.4.2之前版本存在安全漏洞,该漏洞源于UDM错误处理不当,将下游400错误转换为500错误,可能泄露内部错误处理行为。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
free5gcfree5gc < 1.4.2 -

II. Public POCs for CVE-2026-33065

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-33065

登录查看更多情报信息。

Same Patch Batch · free5gc · 2026-03-20 · 7 CVEs total

CVE-2026-32937free5GC CHF has Out-of-Bounds Slice Access that Leads to DoS
CVE-2026-33062free5GC NRF Discovery EncodeGroupId Function Panics on Malformed group-id-list Parameter
CVE-2026-33063free5GC AUSF UE Authentication Panic on Nil SuciSupiMap Interface Conversion
CVE-2026-33064free5GC UDM DataChangeNotification Procedure Panic Due to Nil Pointer Dereference
CVE-2026-33191free5GC UDM vulnerable to null byte injection in URL path parameters causing 500 Internal
CVE-2026-33192free5GC UDM incorrectly returns 500 for empty supi path parameter in PATCH sdm-subscriptio

IV. Related Vulnerabilities

V. Comments for CVE-2026-33065

No comments yet


Leave a comment