CVE-2026-5360
⚪ Do wiadomości
Typ mylenia w Free5GC umożliwia zdalne przeprowadzenie ataku z wysoką złożonością.
CVSS
3.7
EPSS
0.1%
Exploit
none
Vendor
free5gc
Opis źródłowy (NVD)
A vulnerability has been found in Free5GC 4.2.0. The affected element is an unknown function of the component aper. Such manipulation leads to type confusion. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 26205eb01705754b7b902ad6c4b613c96c881e29. It is best practice to apply a patch to resolve this issue.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 3.7 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-02 17:16:32 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 19:32:21 UTC |
Referencje
- https://github.com/free5gc/aper/commit/26205eb01705754b7b902ad6c4b613c96c881e29 (cna@vuldb.com) [Patch]
- https://github.com/free5gc/aper/pull/11 (cna@vuldb.com) [Issue Tracking, Patch]
- https://github.com/free5gc/free5gc/ (cna@vuldb.com) [Product]
- https://github.com/free5gc/free5gc/issues/831 (cna@vuldb.com) [Issue Tracking]
- https://github.com/free5gc/free5gc/issues/831#issue-3996453112 (cna@vuldb.com) [Issue Tracking]
- https://vuldb.com/submit/781573 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/354735 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/354735/cti (cna@vuldb.com) [Permissions Required, VDB Entry]