Impact
This is an out-of-bounds slice access vulnerability in the CHF nchf-convergedcharging service.
A valid authenticated request to PUT /nchf-convergedcharging/v3/recharging/:ueId?ratingGroup=... can trigger a server-side panic in github.com/free5gc/chf/internal/sbi.(*Server).RechargePut(...) due to an out-of-range slice access. In the reported runtime, Gin recovery converts the panic into HTTP 500, but the recharge path remains remotely panic-triggerable and can be abused repeatedly to degrade recharge functionality and flood logs. In deployments without equivalent recovery handling, this panic may cause more severe service disruption.
Patches
free5gc/chf#61
Workarounds
- Restrict access to the
nchf-convergedcharging recharge endpoint to strictly trusted NF callers only.
- Apply rate limiting or network ACLs in front of the CHF SBI interface to reduce repeated panic-trigger attempts.
- If the recharge API is not required, temporarily disable or block external reachability to this route.
- Ensure panic recovery, monitoring, and alerting are enabled.
References
Impact
This is an out-of-bounds slice access vulnerability in the CHF
nchf-convergedchargingservice.A valid authenticated request to PUT
/nchf-convergedcharging/v3/recharging/:ueId?ratingGroup=...can trigger a server-side panic ingithub.com/free5gc/chf/internal/sbi.(*Server).RechargePut(...)due to an out-of-range slice access. In the reported runtime, Gin recovery converts the panic into HTTP 500, but the recharge path remains remotely panic-triggerable and can be abused repeatedly to degrade recharge functionality and flood logs. In deployments without equivalent recovery handling, this panic may cause more severe service disruption.Patches
free5gc/chf#61
Workarounds
nchf-convergedchargingrecharge endpoint to strictly trusted NF callers only.References