CVE-2026-5360
Free5GC aper type confusion
CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
14th
A vulnerability has been found in Free5GC 4.2.0. The affected element is an unknown function of the component aper. Such manipulation leads to type confusion. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 26205eb01705754b7b902ad6c4b613c96c881e29. It is best practice to apply a patch to resolve this issue.
| CWE | CWE-843 |
| Vendor | n/a |
| Product | free5gc |
| Published | Apr 2, 2026 |
| Last Updated | Apr 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a free5gc
Be the first to know when new low vulnerabilities affecting n/a free5gc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / Free5GC
4.2.0
References
vuldb.com: https://vuldb.com/vuln/354735 vuldb.com: https://vuldb.com/vuln/354735/cti vuldb.com: https://vuldb.com/submit/781573 github.com: https://github.com/free5gc/free5gc/issues/831 github.com: https://github.com/free5gc/aper/pull/11 github.com: https://github.com/free5gc/free5gc/issues/831#issue-3996453112 github.com: https://github.com/free5gc/aper/commit/26205eb01705754b7b902ad6c4b613c96c881e29 github.com: https://github.com/free5gc/free5gc/
Credits
๐ shovon0203 (VulDB User)