Ad

CVE-2026-33065

MEDIUM CVSS 4.0: 6.9 EPSS 0.03%
Updated Mar 23, 2026
Linux
Parameter Value
CVSS 6.9 (MEDIUM)
Affected Versions before 1.4.2
Fixed In 1.4.2
Type CWE-209 (Information Exposure Through Error Message)
Vendor Linux
Public PoC No

Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. In versions prior to 1.4.2, the UDM incorrectly converts a downstream 400 Bad Request (from UDR) into a 500 Internal Server Error when handling DELETE requests with an empty supi path parameter. This leaks internal error handling behavior and makes it difficult for clients to distinguish between client-side errors and server-side failures.

When a client sends a DELETE request with an empty supi (e.g., double slashes // in URL path), the UDM forwards the malformed request to UDR, which correctly returns 400. However, UDM propagates this as 500 SYSTEM_FAILURE instead of returning the appropriate 400 error to the client. This violates REST API best practices for DELETE operations.

The issue has been patched in version 1.4.2.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v4.0

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Free5gc Udm
cpe:2.3:a:free5gc:udm:*:*:*:*:*:go:*:*
1.4.2