Description
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a PFCP Session Establishment Request that includes a CreateFAR with an empty or truncated IPv4 address field is not properly validated. During parsing, parseFAR() calls ip2int(), which performs an out-of-bounds read on the IPv4 address buffer and triggers an index-out-of-range panic. An attacker who can send PFCP Session Establishment Request messages to the UPF's N4/PFCP endpoint can exploit this issue to repeatedly crash the UPF and disrupt user-plane services.
References (3)
Core 3
Core References
Broken Link
http://omec-projectupf.com
Broken Link
http://upf-epc-pfcpiface.com
Exploit, Issue Tracking, Third Party Advisory
https://github.com/omec-project/upf/issues/962
Scores
CVSS v3
7.5
EPSS
0.0008
EPSS Percentile
24.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (1)
opennetworking/upf
2.1.3 dev
Published
Dec 18, 2025
Tracked Since
Feb 18, 2026