The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-1684

CVE-2026-1684: Free5GC SMF Denial of Service Vulnerability

CVE-2026-1684 is a denial of service vulnerability in Free5GC SMF affecting versions up to 4.1.0. Attackers can exploit the PFCP UDP Endpoint remotely to disrupt service. This article covers technical details, impact, and patches.

Published: February 6, 2026

CVE-2026-1684 Overview

A denial of service vulnerability has been discovered in Free5GC SMF (Session Management Function) up to version 4.1.0. The vulnerability exists in the HandleReports function within the file /internal/context/pfcp_reports.go of the PFCP (Packet Forwarding Control Protocol) UDP Endpoint component. This flaw allows remote attackers to cause a denial of service condition by sending specially crafted network requests to the affected component.

Critical Impact

Remote attackers can disrupt 5G core network operations by causing denial of service in the SMF component, potentially affecting user connectivity and network services.

Affected Products

  • Free5GC SMF up to version 4.1.0
  • Free5GC deployments utilizing the affected PFCP UDP Endpoint component
  • 5G core network implementations based on vulnerable Free5GC versions

Discovery Timeline

  • 2026-01-30 - CVE-2026-1684 published to NVD
  • 2026-02-04 - Last updated in NVD database

Technical Details for CVE-2026-1684

Vulnerability Analysis

This vulnerability is classified as CWE-404 (Improper Resource Shutdown or Release), which indicates that the affected component fails to properly release resources when handling certain conditions. In the context of the Free5GC SMF component, the HandleReports function within the PFCP reports handling logic does not adequately manage resources, leading to resource exhaustion or improper state handling that results in service disruption.

The PFCP protocol is critical in 5G networks for communication between the control plane and user plane functions. When the SMF component receives malformed or specifically crafted PFCP messages through the UDP endpoint, the improper resource handling can cause the service to become unresponsive or crash, effectively disrupting 5G core network operations.

Root Cause

The root cause of this vulnerability lies in the improper resource management within the HandleReports function located in /internal/context/pfcp_reports.go. The function fails to properly release or clean up resources under certain conditions, which can be triggered remotely via network requests. This improper resource shutdown or release (CWE-404) allows attackers to exhaust available resources or corrupt internal state, leading to denial of service.

Attack Vector

The attack can be executed remotely over the network without requiring any authentication or user interaction. An attacker with network access to the PFCP UDP endpoint can send specially crafted packets to trigger the vulnerability in the HandleReports function. The attack complexity is low, making it accessible to attackers with basic networking knowledge and tools capable of generating custom UDP packets.

The vulnerability exists in the network-facing PFCP UDP endpoint, which is designed to handle Packet Forwarding Control Protocol messages. By targeting this endpoint with malicious input, attackers can exploit the improper resource handling behavior to cause service disruption.

Detection Methods for CVE-2026-1684

Indicators of Compromise

  • Unusual volume of PFCP UDP packets targeting the SMF component on the standard PFCP port (typically port 8805)
  • Unexpected SMF service crashes or restarts without apparent cause
  • Resource exhaustion patterns in SMF container or process metrics (memory, file descriptors)
  • Anomalous network traffic patterns from untrusted sources directed at 5G core infrastructure

Detection Strategies

  • Monitor SMF service health and implement alerting for unexpected service restarts or unresponsive states
  • Deploy network-level monitoring to detect unusual PFCP traffic patterns or traffic from unauthorized sources
  • Implement intrusion detection rules to identify malformed PFCP packets or high-volume UDP traffic targeting SMF endpoints
  • Review SMF application logs for error patterns related to the HandleReports function or PFCP processing failures

Monitoring Recommendations

  • Enable verbose logging for PFCP message processing within the SMF component to capture potential exploit attempts
  • Implement rate limiting on PFCP UDP endpoints to mitigate volumetric attack attempts
  • Deploy network segmentation to restrict access to 5G core components from untrusted network zones
  • Use container or process monitoring to track resource utilization patterns that may indicate exploitation attempts

How to Mitigate CVE-2026-1684

Immediate Actions Required

  • Review the GitHub Pull Request #188 which contains the patch for this vulnerability
  • Restrict network access to the PFCP UDP endpoint to only authorized network elements
  • Implement network-level filtering to block untrusted traffic from reaching 5G core components
  • Monitor affected systems for signs of exploitation while preparing for patch deployment

Patch Information

A patch addressing this vulnerability is available through GitHub Pull Request #188 in the Free5GC SMF repository. Organizations running affected versions should review the patch and apply it according to their change management procedures. Additional technical details and community discussion can be found in GitHub Issue #806.

For tracking and threat intelligence information, refer to the VulDB entry #343477.

Workarounds

  • Implement strict network access controls to limit PFCP UDP endpoint exposure to only trusted network elements and management interfaces
  • Deploy a firewall or network filter in front of the SMF component to drop PFCP traffic from unauthorized sources
  • Consider deploying the SMF component behind a load balancer or proxy capable of rate limiting and basic protocol validation
  • If feasible, temporarily disable or isolate the affected SMF instance while applying the patch, and route traffic through unaffected instances
bash
# Example: Restrict PFCP UDP port access using iptables
# Allow PFCP (port 8805) only from trusted UPF addresses
iptables -A INPUT -p udp --dport 8805 -s <trusted_upf_ip> -j ACCEPT
iptables -A INPUT -p udp --dport 8805 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechFree5gc

  • SeverityMEDIUM

  • CVSS Score6.9

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-404
  • Technical References
  • GitHub Issue #806

  • GitHub Pull Request #188

  • VulDB CTI #343477

  • VulDB #343477

  • VulDB Submission #739655

  • VulDB Submission #739656
  • Related CVEs
  • CVE-2026-5661: Free5GC NGSetupRequest Handler DoS Flaw

  • CVE-2026-30653: Free5gc DoS Vulnerability

  • CVE-2026-33191: Free5gc Udm DOS Vulnerability

  • CVE-2026-4531: Free5GC AMF Component DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English