Technology Apr 22, 2026 · 2 min read

CVE-2026-40343: CVE-2026-40343: Fail-Open Request Handling in free5GC UDR Policy Data Subscription

CVE-2026-40343: Fail-Open Request Handling in free5GC UDR Policy Data Subscription Vulnerability ID: CVE-2026-40343 CVSS Score: 6.9 Published: 2026-04-21 A fail-open request handling vulnerability in the free5GC UDR service up to version 1.4.2 allows attackers to create invalid or unin...

DE
DEV Community
by CVE Reports
CVE-2026-40343: CVE-2026-40343: Fail-Open Request Handling in free5GC UDR Policy Data Subscription

CVE-2026-40343: Fail-Open Request Handling in free5GC UDR Policy Data Subscription

Vulnerability ID: CVE-2026-40343
CVSS Score: 6.9
Published: 2026-04-21

A fail-open request handling vulnerability in the free5GC UDR service up to version 1.4.2 allows attackers to create invalid or unintended Policy Data notification subscriptions. The application fails to terminate execution upon encountering HTTP body retrieval or JSON deserialization errors, proceeding to process uninitialized data.

TL;DR

free5GC UDR <= 1.4.2 processes uninitialized subscription data due to missing error return paths, enabling state manipulation via malformed POST requests.

Technical Details

  • CWE ID: CWE-754
  • Attack Vector: Network
  • CVSS: 6.9
  • Impact: Integrity
  • Exploit Status: None
  • KEV Status: Not Listed

Affected Systems

  • free5GC UDR (User Data Repository)
  • udr: <= 1.4.2

Mitigation Strategies

  • Manual code patching to enforce fail-closed behavior
  • Network segmentation of SBI interfaces
  • API payload validation via WAF

Remediation Steps:

  1. Locate HandlePolicyDataSubsToNotifyPost in api_datarepository.go
  2. Add explicit 'return' statements inside the error handling blocks for c.GetRawData() and openapi.Deserialize()
  3. Modify the openapi.Deserialize() call to pass policyDataSubscription by pointer (&)
  4. Recompile and redeploy the UDR service

References

Read the full report for CVE-2026-40343 on our website for more details including interactive diagrams and full exploit analysis.

DE
Source

This article was originally published by DEV Community and written by CVE Reports.

Read original article on DEV Community
Back to Discover

Reading List