CVE-2026-1976
Free5GC SMF SessionDeletionResponse null pointer dereference
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
A weakness has been identified in Free5GC up to 4.1.0. Affected is the function SessionDeletionResponse of the component SMF. This manipulation causes null pointer dereference. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. It is suggested to install a patch to address this issue.
| CWE | CWE-476 CWE-404 |
| Vendor | n/a |
| Product | free5gc |
| Published | Feb 6, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a free5gc
Be the first to know when new medium vulnerabilities affecting n/a free5gc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / Free5GC
4.0 4.1.0
References
vuldb.com: https://vuldb.com/?id.344498 vuldb.com: https://vuldb.com/?ctiid.344498 vuldb.com: https://vuldb.com/?submit.743239 github.com: https://github.com/free5gc/free5gc/issues/817 github.com: https://github.com/free5gc/free5gc/issues/817#issue-3832188092 github.com: https://github.com/free5gc/smf/pull/189 github.com: https://github.com/free5gc/free5gc/
Credits
๐ LinZiyu (VulDB User)