CVE-2025-65568

HIGH

Opennetworking Upf - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a PFCP Session Establishment Request that includes a CreateFAR with an empty or truncated IPv4 address field is not properly validated. During parsing, parseFAR() calls ip2int(), which performs an out-of-bounds read on the IPv4 address buffer and triggers an index-out-of-range panic. An attacker who can send PFCP Session Establishment Request messages to the UPF's N4/PFCP endpoint can exploit this issue to repeatedly crash the UPF and disrupt user-plane services.

References (3)

Core 3
Core References
Exploit, Issue Tracking, Third Party Advisory
https://github.com/omec-project/upf/issues/962

Scores

CVSS v3 7.5
EPSS 0.0008
EPSS Percentile 24.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-125
Status published
Products (1)
opennetworking/upf 2.1.3 dev
Published Dec 18, 2025
Tracked Since Feb 18, 2026