CVE-2026-5360
MEDIUM
6,3
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW
3,7
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
LOW
2,6
Source: [email protected]
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial
Description
AI Translation Available
A vulnerability has been found in Free5GC 4.2.0. The affected element is an unknown function of the component aper. Such manipulation leads to type confusion. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 26205eb01705754b7b902ad6c4b613c96c881e29. It is best practice to apply a patch to resolve this issue.
843
Access of Resource Using Incompatible Type ('Type Confusion')
IncompleteCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Potential Impacts:
Read Memory
Modify Memory
Execute Unauthorized Code Or Commands
Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages:
C, C++
https://github.com/free5gc/aper/commit/26205eb01705754b7b902ad6c4b613c96c881e29
https://github.com/free5gc/aper/pull/11
https://github.com/free5gc/free5gc/
https://github.com/free5gc/free5gc/issues/831
https://github.com/free5gc/free5gc/issues/831#issue-3996453112
https://vuldb.com/submit/781573
https://vuldb.com/vuln/354735
https://vuldb.com/vuln/354735/cti