{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1683","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-30T07:35:38.819Z","datePublished":"2026-01-30T14:02:09.654Z","dateUpdated":"2026-02-23T09:08:30.115Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:08:30.115Z"},"title":"Free5GC SMF PFCP handler.go HandlePfcpSessionReportRequest denial of service","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"Free5GC","product":"SMF","versions":[{"version":"4.0","status":"affected"},{"version":"4.1.0","status":"affected"}],"modules":["PFCP"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Free5GC SMF up to 4.1.0. Affected by this vulnerability is the function HandlePfcpSessionReportRequest of the file internal/pfcp/handler/handler.go of the component PFCP. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. To fix this issue, it is recommended to deploy a patch."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-01-30T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-30T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-17T20:46:42.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ZiyuLin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343476","name":"VDB-343476 | Free5GC SMF PFCP handler.go HandlePfcpSessionReportRequest denial of service","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343476","name":"VDB-343476 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.739653","name":"Submit #739653 | free5gc SMF v4.1.0 Denial of Service","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.739654","name":"Submit #739654 | free5gc SMF v4.1.0 Denial of Service (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/free5gc/free5gc/issues/804","tags":["issue-tracking"]},{"url":"https://github.com/free5gc/free5gc/issues/804#issue-3816086696","tags":["exploit","issue-tracking"]},{"url":"https://github.com/free5gc/smf/pull/188","tags":["issue-tracking","patch"]},{"url":"https://github.com/free5gc/smf/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-30T14:47:31.817009Z","id":"CVE-2026-1683","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-30T14:48:18.216Z"}}]}}