{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1739","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-01T07:50:20.426Z","datePublished":"2026-02-02T02:02:10.383Z","dateUpdated":"2026-02-23T09:12:55.936Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:12:55.936Z"},"title":"Free5GC pcf smpolicy.go HandleCreateSmPolicyRequest null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"Free5GC","product":"pcf","versions":[{"version":"1.4.0","status":"affected"},{"version":"1.4.1","status":"affected"}],"cpes":["cpe:2.3:a:free5gc:pcf:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Free5GC pcf up to 1.4.1. This affects the function HandleCreateSmPolicyRequest of the file internal/sbi/processor/smpolicy.go. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is df535f5524314620715e842baf9723efbeb481a7. Applying a patch is the recommended action to fix this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-02-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-12T02:12:26.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ZiyuLin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343638","name":"VDB-343638 | Free5GC pcf smpolicy.go HandleCreateSmPolicyRequest null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343638","name":"VDB-343638 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.741194","name":"Submit #741194 | free5gc PCF v4.1.0 Denial of Service","tags":["third-party-advisory"]},{"url":"https://github.com/free5gc/free5gc/issues/803","tags":["issue-tracking"]},{"url":"https://github.com/free5gc/pcf/pull/62","tags":["issue-tracking"]},{"url":"https://github.com/free5gc/free5gc/issues/803#issue-3815770007","tags":["exploit","issue-tracking"]},{"url":"https://github.com/free5gc/pcf/commit/df535f5524314620715e842baf9723efbeb481a7","tags":["patch"]},{"url":"https://github.com/free5gc/pcf/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-02T14:18:12.449884Z","id":"CVE-2026-1739","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-02T14:21:17.064Z"}}]}}