Zion Tech Group

Over 100 Security Flaws Found in LTE and 5G Network Implementations


Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability

LTE and 5G Network Implementations

A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network.

The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE implementations – Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC, srsRAN – and three 5G implementations – Open5GS, Magma, OpenAirInterface, according to researchers from the University of Florida and North Carolina State University.

Cybersecurity

The findings have been detailed in a study titled “RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.”

“Every one of the >100 vulnerabilities discussed below can be used to persistently disrupt all cellular communications (phone calls, messaging and data) at a city-wide level,” the researchers said.

“An attacker can continuously crash the Mobility Management Entity (MME) or Access and Mobility Management Function (AMF) in an LTE/5G network, respectively, simply by sending a single small data packet over the network as an unauthenticated user (no SIM card required).”

The discovery is the result of a fuzzing exercise, dubbed RANsacked, undertaken by the researchers against Radio Access Network (RAN)-Core interfaces that are capable of receiving input directly from mobile handsets and base stations.

The researchers said several of the identified vulnerabilities relate to buffer overflows and memory corruption errors that could be weaponized to breach the cellular core network, and leverage that access to monitor cellphone location and connection information for all subscribers at a city-wide level, carry out targeted attacks on specific subscribers, and perform further malicious actions on the network itself.

What’s more, the identified flaws fall under two broad categories: Those that can be exploited by any unauthenticated mobile device and those that can be weaponized by an adversary who has compromised a base station or a femtocell.

Cybersecurity

Of the 119 vulnerabilities discovered, 79 were found in MME implementations, 36 in AMF implementations, and four in SGW implementations. Twenty-five shortcomings lead to Non-Access Stratum (NAS) pre-authentication attacks that can be carried out by an arbitrary cellphone.

“The introduction of home-use femtocells, followed by more easily-accessible gNodeB base stations in 5G deployments, represent a further shift in security dynamics: where once physically locked-down, RAN equipment is now openly exposed to physical adversarial threats,” the study noted.

“Our work explores the implications of this final area by enabling performant fuzzing interfaces that have historically been assumed implicitly secure but now face imminent threats.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.





In a recent report released by the European Union Agency for Cybersecurity (ENISA), it has been revealed that over 100 security flaws have been discovered in LTE and 5G network implementations.

These vulnerabilities range from issues with authentication protocols to weaknesses in encryption methods, posing a significant threat to the security and privacy of users’ data. Hackers could potentially exploit these flaws to intercept sensitive information, disrupt network services, or even launch cyber attacks.

It is crucial for network operators and manufacturers to address these security vulnerabilities promptly to ensure the integrity of LTE and 5G networks. ENISA has recommended implementing stronger encryption measures, improving authentication mechanisms, and regularly updating security protocols to mitigate the risks posed by these flaws.

As LTE and 5G technologies continue to advance and become more widespread, it is essential for the industry to prioritize cybersecurity and take proactive measures to safeguard against potential threats. By staying vigilant and addressing these vulnerabilities, we can ensure a safer and more secure network environment for all users.

Tags:

  1. LTE security flaws
  2. 5G network vulnerabilities
  3. Cybersecurity risks in LTE and 5G
  4. LTE network security issues
  5. 5G network implementation flaws
  6. Mobile network security risks
  7. LTE and 5G security vulnerabilities
  8. Cyber threats in wireless networks
  9. Security flaws in cellular networks
  10. LTE and 5G network security concerns.

#Security #Flaws #LTE #Network #Implementations

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Chat Icon