CVE-2026-5360

Published: Apr 02, 2026 Last Modified: Apr 02, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,3
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW 3,7
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
LOW 2,6
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

A vulnerability has been found in Free5GC 4.2.0. The affected element is an unknown function of the component aper. Such manipulation leads to type confusion. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 26205eb01705754b7b902ad6c4b613c96c881e29. It is best practice to apply a patch to resolve this issue.

843

Access of Resource Using Incompatible Type ('Type Confusion')

Incomplete
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality
Potential Impacts:
Read Memory Modify Memory Execute Unauthorized Code Or Commands Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages: C, C++
View CWE Details
https://github.com/free5gc/aper/commit/26205eb01705754b7b902ad6c4b613c96c881e29
https://github.com/free5gc/aper/pull/11
https://github.com/free5gc/free5gc/
https://github.com/free5gc/free5gc/issues/831
https://github.com/free5gc/free5gc/issues/831#issue-3996453112
https://vuldb.com/submit/781573
https://vuldb.com/vuln/354735
https://vuldb.com/vuln/354735/cti