New security flaws emerge with 5G
As 5G faces logistical and technical hurdles, its vulnerabilities are also being discovered almost by the dozen.
Worldwide Researchers are presenting new findings that the 5G specification still has vulnerabilities. And with 5G increasingly becoming a reality, time is running out to catch these flaws.
The researchers are detailing 11 new design issues in 5G protocols that could expose users’ location, downgrade service to old mobile data networks, run up their wireless bills, or even track when they make calls, text, or browse the web. They also found five additional 5G vulnerabilities that carried over from 3G and 4G. They identified all of those flaws with a new custom tool called 5GReasoner.
One purported benefit of 5G is that it protects phone identifiers, like the device's "international mobile subscriber identity," to help prevent tracking or targeted attacks. But downgrade attacks like the ones the researchers found can bump the device down to 4G or put it into limited service mode, then force it to send its IMSI number unencrypted. Increasingly, networks use an alternative ID called a Temporary Mobile Subscriber Identity that refreshes periodically to stymie tracking. But the researchers also found flaws that could allow them to override TMSI resets, or correlate a device's old and new TMSI, to track devices. Mounting those attacks takes only software-defined radios that cost a few hundred dollars.
The 5GReasoner tool also found issues with the part of the 5G standard that governs things like initial device registration, deregistration, and paging, which notifies your phone about incoming calls and texts. Depending on how a carrier implements the standard, attackers could mount "replay" attacks to run up a target's mobile bill by repeatedly sending the same message or command. It's an instance of vague wording in the 5G standard that could cause carriers to implement it weakly.
The researchers note that a limitation of their study is that they didn't have access to a commercial 5G network to test the attacks in practice. But they point out that while GSMA says the attacks are low impact, it still listed the work in its Mobile Security Research Hall of Fame
Saudi Aramco’s share surges on its trading debut
The shares of Saudi Aramco has surged on its debut trading after the compan...
Vertiv partners with GS Acquisition Holdings to be listed on N
Vertiv Holdings LLC has announced it will become a publicly traded company...
Rolling out of CMMC can put an end to ISO 27001, SOC 2 & HITRU
In the not-too-distant future, I can clearly see how ISO 27001, SOC 2 and H...