{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1976","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-05T13:33:54.329Z","datePublished":"2026-02-06T03:02:11.211Z","dateUpdated":"2026-02-23T09:20:25.492Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:20:25.492Z"},"title":"Free5GC SMF SessionDeletionResponse null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"Free5GC","versions":[{"version":"4.0","status":"affected"},{"version":"4.1.0","status":"affected"}],"cpes":["cpe:2.3:a:free5gc:free5gc:*:*:*:*:*:*:*:*"],"modules":["SMF"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Free5GC up to 4.1.0. Affected is the function SessionDeletionResponse of the component SMF. This manipulation causes null pointer dereference. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. It is suggested to install a patch to address this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-02-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-09T17:03:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LinZiyu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344498","name":"VDB-344498 | Free5GC SMF SessionDeletionResponse null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344498","name":"VDB-344498 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.743239","name":"Submit #743239 | free5gc SMF v4.1.0 Denial of Service","tags":["third-party-advisory"]},{"url":"https://github.com/free5gc/free5gc/issues/817","tags":["issue-tracking"]},{"url":"https://github.com/free5gc/free5gc/issues/817#issue-3832188092","tags":["exploit","issue-tracking"]},{"url":"https://github.com/free5gc/smf/pull/189","tags":["issue-tracking","patch"]},{"url":"https://github.com/free5gc/free5gc/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-06T19:33:53.291970Z","id":"CVE-2026-1976","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-06T19:34:01.663Z"}}]}}