<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security of 5G networks</title>
	<atom:link href="http://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 21:53:56 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1860585</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 23 Aug 2025 10:44:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1860585</guid>
		<description><![CDATA[Researchers recap some security downsides to open RAN
Black Hat presentation earlier this month covered risks from malicious users, supply-chain threats, cloud tenants and more. Researchers conclude that an increase in interoperability could also yield an increase in vulnerability.
https://www.lightreading.com/open-ran/researchers-recap-some-security-downsides-to-open-ran]]></description>
		<content:encoded><![CDATA[<p>Researchers recap some security downsides to open RAN<br />
Black Hat presentation earlier this month covered risks from malicious users, supply-chain threats, cloud tenants and more. Researchers conclude that an increase in interoperability could also yield an increase in vulnerability.<br />
<a href="https://www.lightreading.com/open-ran/researchers-recap-some-security-downsides-to-open-ran" rel="nofollow">https://www.lightreading.com/open-ran/researchers-recap-some-security-downsides-to-open-ran</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1859924</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 18 Aug 2025 11:38:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1859924</guid>
		<description><![CDATA[Sniffing 5G With Software-Defined Radio
https://hackaday.com/2025/08/18/sniffing-5g-with-software-defined-radio/

The fifth generation mobile communications protocol (5G) is perhaps the most complicated wireless protocol ever made. Featuring wildly fast download speeds, beam forming base stations, and of course non-standard additions, it’s rather daunting prospect to analyze for the home hacker and researcher alike. But this didn’t stop the ASSET Research Group from developing a 5G sniffer and downlink injector.

The crux of the project is focused around real-time sniffing using one of two Universal Software Radio Peripheral (USRP) software-defined radios (SDRs), and a substantial quantity of compute power. This sniffed data can even be piped into Wireshark for filtering. The frequency is hard-coded into the sniffer for improved performance with the n78 and n41 bands having been tested as of writing. While we expect most of you don’t have the supported USRP hardware, they provided a sample capture file for anyone to analyze.

https://github.com/asset-group/Sni5Gect-5GNR-sniffing-and-exploitation]]></description>
		<content:encoded><![CDATA[<p>Sniffing 5G With Software-Defined Radio<br />
<a href="https://hackaday.com/2025/08/18/sniffing-5g-with-software-defined-radio/" rel="nofollow">https://hackaday.com/2025/08/18/sniffing-5g-with-software-defined-radio/</a></p>
<p>The fifth generation mobile communications protocol (5G) is perhaps the most complicated wireless protocol ever made. Featuring wildly fast download speeds, beam forming base stations, and of course non-standard additions, it’s rather daunting prospect to analyze for the home hacker and researcher alike. But this didn’t stop the ASSET Research Group from developing a 5G sniffer and downlink injector.</p>
<p>The crux of the project is focused around real-time sniffing using one of two Universal Software Radio Peripheral (USRP) software-defined radios (SDRs), and a substantial quantity of compute power. This sniffed data can even be piped into Wireshark for filtering. The frequency is hard-coded into the sniffer for improved performance with the n78 and n41 bands having been tested as of writing. While we expect most of you don’t have the supported USRP hardware, they provided a sample capture file for anyone to analyze.</p>
<p><a href="https://github.com/asset-group/Sni5Gect-5GNR-sniffing-and-exploitation" rel="nofollow">https://github.com/asset-group/Sni5Gect-5GNR-sniffing-and-exploitation</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1844783</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 28 Jan 2025 11:02:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1844783</guid>
		<description><![CDATA[LTE, 5G Vulnerabilities Could Cut Entire Cities From Cellular Connectivity

Vulnerabilities in LTE/5G core infrastructure, some remotely exploitable, could lead to persistent denial-of-service to entire cities.

https://www.securityweek.com/lte-5g-vulnerabilities-could-cut-entire-cities-from-cellular-connectivity/]]></description>
		<content:encoded><![CDATA[<p>LTE, 5G Vulnerabilities Could Cut Entire Cities From Cellular Connectivity</p>
<p>Vulnerabilities in LTE/5G core infrastructure, some remotely exploitable, could lead to persistent denial-of-service to entire cities.</p>
<p><a href="https://www.securityweek.com/lte-5g-vulnerabilities-could-cut-entire-cities-from-cellular-connectivity/" rel="nofollow">https://www.securityweek.com/lte-5g-vulnerabilities-could-cut-entire-cities-from-cellular-connectivity/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1844440</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 24 Jan 2025 22:46:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1844440</guid>
		<description><![CDATA[https://www.facebook.com/share/p/1Ao8fKWEtt/

A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network.

The [119 vulnerabilities](https://cellularsecurity.org/ransacked), assigned 97 unique CVE identifiers, span seven LTE implementations – [Open5GS](https://open5gs.org/), [Magma](https://magmacore.org/), [OpenAirInterface](https://openairinterface.org/), [Athonet](https://www.hpe.com/us/en/solutions/athonet.html), [SD-Core](https://opennetworking.org/sd-core/), [NextEPC](https://nextepc.org/), [srsRAN](https://www.srsran.com/) – and three 5G implementations – Open5GS, Magma, OpenAirInterface, according to researchers from the University of Florida and North Carolina State University.

The findings have been detailed in a study titled &quot;RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.&quot;

&quot;Every one of the &gt;100 vulnerabilities discussed below can be used to persistently disrupt all cellular communications (phone calls, messaging and data) at a city-wide level,&quot; the researchers said.

&quot;An attacker can continuously crash the Mobility Management Entity (MME) or Access and Mobility Management Function (AMF) in an LTE/5G network, respectively, simply by sending a single small data packet over the network as an unauthenticated user (no SIM card required).&quot;

The discovery is the result of a [fuzzing exercise](https://github.com/FICS/asnfuzzgen), dubbed RANsacked, undertaken by the researchers against Radio Access Network ([RAN](https://en.wikipedia.org/wiki/Radio_access_network))-Core interfaces that are capable of receiving input directly from mobile handsets and base stations.

The researchers said several of the identified vulnerabilities relate to buffer overflows and memory corruption errors that could be weaponized to breach the cellular core network, and leverage that access to monitor cellphone location and connection information for all subscribers at a city-wide level, carry out targeted attacks on specific subscribers, and perform further malicious actions on the network itself.

#2600net #irc #secnews #4g #5g #lte #vulnerabilities]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.facebook.com/share/p/1Ao8fKWEtt/" rel="nofollow">https://www.facebook.com/share/p/1Ao8fKWEtt/</a></p>
<p>A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network.</p>
<p>The [119 vulnerabilities](<a href="https://cellularsecurity.org/ransacked" rel="nofollow">https://cellularsecurity.org/ransacked</a>), assigned 97 unique CVE identifiers, span seven LTE implementations – [Open5GS](<a href="https://open5gs.org/" rel="nofollow">https://open5gs.org/</a>), [Magma](<a href="https://magmacore.org/" rel="nofollow">https://magmacore.org/</a>), [OpenAirInterface](<a href="https://openairinterface.org/" rel="nofollow">https://openairinterface.org/</a>), [Athonet](<a href="https://www.hpe.com/us/en/solutions/athonet.html" rel="nofollow">https://www.hpe.com/us/en/solutions/athonet.html</a>), [SD-Core](<a href="https://opennetworking.org/sd-core/" rel="nofollow">https://opennetworking.org/sd-core/</a>), [NextEPC](<a href="https://nextepc.org/" rel="nofollow">https://nextepc.org/</a>), [srsRAN](<a href="https://www.srsran.com/" rel="nofollow">https://www.srsran.com/</a>) – and three 5G implementations – Open5GS, Magma, OpenAirInterface, according to researchers from the University of Florida and North Carolina State University.</p>
<p>The findings have been detailed in a study titled &#8220;RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.&#8221;</p>
<p>&#8220;Every one of the &gt;100 vulnerabilities discussed below can be used to persistently disrupt all cellular communications (phone calls, messaging and data) at a city-wide level,&#8221; the researchers said.</p>
<p>&#8220;An attacker can continuously crash the Mobility Management Entity (MME) or Access and Mobility Management Function (AMF) in an LTE/5G network, respectively, simply by sending a single small data packet over the network as an unauthenticated user (no SIM card required).&#8221;</p>
<p>The discovery is the result of a [fuzzing exercise](<a href="https://github.com/FICS/asnfuzzgen" rel="nofollow">https://github.com/FICS/asnfuzzgen</a>), dubbed RANsacked, undertaken by the researchers against Radio Access Network ([RAN](<a href="https://en.wikipedia.org/wiki/Radio_access_network" rel="nofollow">https://en.wikipedia.org/wiki/Radio_access_network</a>))-Core interfaces that are capable of receiving input directly from mobile handsets and base stations.</p>
<p>The researchers said several of the identified vulnerabilities relate to buffer overflows and memory corruption errors that could be weaponized to breach the cellular core network, and leverage that access to monitor cellphone location and connection information for all subscribers at a city-wide level, carry out targeted attacks on specific subscribers, and perform further malicious actions on the network itself.</p>
<p>#2600net #irc #secnews #4g #5g #lte #vulnerabilities</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1834037</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 13 Aug 2024 12:02:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1834037</guid>
		<description><![CDATA[Tutkijat onnistuivat rikkomaan 5G-tietoturvan ”täydellisesti” – mahdollistaa monenlaisen haitanteon
https://muropaketti.com/mobiili/tutkijat-onnistuivat-rikkomaan-5g-tietoturvan-taydellisesti-mahdollistaa-monenlaisen-haitanteon/

Tieteilijät keksivät keinon vakoilla puhelinliikennettä huijaamalla puhelinta.

Pennsylvanian valtionylipiston tutkijat löysivät 5G-tekniikkaa käyttävistä älypuhelimista useita tietoturva-aukkoja. Haavoittuvuudet liittyvät lähinnä puhelimien käyttämiin baseband-piireihin, jotka vastaavat puheluiden, tekstiviestien ja tiedonsiirron hallinnasta.

Tieteilijät kehittivät tutkimustaan varten oman, GitHugista ladattavan analyysityökalunsa nimeltään 5GBaseChecker. Sen avulla he löysivät 12 haavoittuvuutta Samsungin, MediaTekin ja Qualcommin valmistamista piireistä liittyen baseband-haavoittuvuuksiin. Piirejä käytetään ainakin Googlen, Oppon, OnePlussan, Motorolan ja Samsungin puhelimissa.

Tutkijoiden onnistui huijata uhrien puhelimet liittymään väärennettyyn matkapuhelinmastoon, josta tieteilijät pystyivät tekemään hyökkäyksiä mastoon liittyneisiin puhelimiin. Yksi tutkimuksen toteuttamiseen osallistuneista henkilöistä kuvaili, että 5G-tietoturva rikkoutui täydellisesti, eikä puhelimen käyttäjä voinut havaita hyökkäystä.

Hyökkäyksen avulla voi esimerkiksi lähettää puhelimen omistajan nimissä tekstiviestejä. Puhelimen voi myös ohjata huijaussivustoille

5G-yhteyden pystyi tiputtamaan vanhempaan yhteystekniikkaan kuten 4G:hen tai vielä vanhempaan. Se helpotti entisestään ainakin salakuuntelua ja uhrin tekemisten seuraamista.

Tieteilijät ilmoittivat löytämistään haavoittuvuuksista teknologiayrityksille. Heidän löytämänsä 12 haavoittuvuutta on nyt korjattu, mutta verkko-operaattoreiden täytyy myös asentaa päivitykset.]]></description>
		<content:encoded><![CDATA[<p>Tutkijat onnistuivat rikkomaan 5G-tietoturvan ”täydellisesti” – mahdollistaa monenlaisen haitanteon<br />
<a href="https://muropaketti.com/mobiili/tutkijat-onnistuivat-rikkomaan-5g-tietoturvan-taydellisesti-mahdollistaa-monenlaisen-haitanteon/" rel="nofollow">https://muropaketti.com/mobiili/tutkijat-onnistuivat-rikkomaan-5g-tietoturvan-taydellisesti-mahdollistaa-monenlaisen-haitanteon/</a></p>
<p>Tieteilijät keksivät keinon vakoilla puhelinliikennettä huijaamalla puhelinta.</p>
<p>Pennsylvanian valtionylipiston tutkijat löysivät 5G-tekniikkaa käyttävistä älypuhelimista useita tietoturva-aukkoja. Haavoittuvuudet liittyvät lähinnä puhelimien käyttämiin baseband-piireihin, jotka vastaavat puheluiden, tekstiviestien ja tiedonsiirron hallinnasta.</p>
<p>Tieteilijät kehittivät tutkimustaan varten oman, GitHugista ladattavan analyysityökalunsa nimeltään 5GBaseChecker. Sen avulla he löysivät 12 haavoittuvuutta Samsungin, MediaTekin ja Qualcommin valmistamista piireistä liittyen baseband-haavoittuvuuksiin. Piirejä käytetään ainakin Googlen, Oppon, OnePlussan, Motorolan ja Samsungin puhelimissa.</p>
<p>Tutkijoiden onnistui huijata uhrien puhelimet liittymään väärennettyyn matkapuhelinmastoon, josta tieteilijät pystyivät tekemään hyökkäyksiä mastoon liittyneisiin puhelimiin. Yksi tutkimuksen toteuttamiseen osallistuneista henkilöistä kuvaili, että 5G-tietoturva rikkoutui täydellisesti, eikä puhelimen käyttäjä voinut havaita hyökkäystä.</p>
<p>Hyökkäyksen avulla voi esimerkiksi lähettää puhelimen omistajan nimissä tekstiviestejä. Puhelimen voi myös ohjata huijaussivustoille</p>
<p>5G-yhteyden pystyi tiputtamaan vanhempaan yhteystekniikkaan kuten 4G:hen tai vielä vanhempaan. Se helpotti entisestään ainakin salakuuntelua ja uhrin tekemisten seuraamista.</p>
<p>Tieteilijät ilmoittivat löytämistään haavoittuvuuksista teknologiayrityksille. Heidän löytämänsä 12 haavoittuvuutta on nyt korjattu, mutta verkko-operaattoreiden täytyy myös asentaa päivitykset.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1831168</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 28 Jun 2024 16:17:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1831168</guid>
		<description><![CDATA[Your Phone’s 5G Connection is Vulnerable to Bypass, DoS Attacks
Wireless service providers prioritize uptime and lag time, occasionally at the cost of security, allowing attackers to take advantage, steal data, and worse.
https://www.darkreading.com/mobile-security/your-phone-s-5g-connection-is-exposed-to-bypass-dos-attacks

Mobile devices are at risk of wanton data theft and denial of service, thanks to vulnerabilities in 5G technologies.

At the upcoming Black Hat 2024 in Las Vegas, a team of seven Penn State University researchers will describe how hackers can go beyond sniffing your Internet traffic by literally providing your Internet connection to you. From there, spying, phishing, and plenty more are all on the table.

It’s a remarkably accessible form of attack, they say, involving commonly overlooked vulnerabilities and equipment you can buy online for a couple of hundred dollars.]]></description>
		<content:encoded><![CDATA[<p>Your Phone’s 5G Connection is Vulnerable to Bypass, DoS Attacks<br />
Wireless service providers prioritize uptime and lag time, occasionally at the cost of security, allowing attackers to take advantage, steal data, and worse.<br />
<a href="https://www.darkreading.com/mobile-security/your-phone-s-5g-connection-is-exposed-to-bypass-dos-attacks" rel="nofollow">https://www.darkreading.com/mobile-security/your-phone-s-5g-connection-is-exposed-to-bypass-dos-attacks</a></p>
<p>Mobile devices are at risk of wanton data theft and denial of service, thanks to vulnerabilities in 5G technologies.</p>
<p>At the upcoming Black Hat 2024 in Las Vegas, a team of seven Penn State University researchers will describe how hackers can go beyond sniffing your Internet traffic by literally providing your Internet connection to you. From there, spying, phishing, and plenty more are all on the table.</p>
<p>It’s a remarkably accessible form of attack, they say, involving commonly overlooked vulnerabilities and equipment you can buy online for a couple of hundred dollars.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1813820</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 Sep 2023 06:24:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1813820</guid>
		<description><![CDATA[Attacks on 5G Infrastructure From Users’ Devices https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html

With the growing spectrum for commercial use, usage and popularization of private 5G networks are on the rise. The manufacturing, defense, ports, energy, logistics, and mining industries are just some of the earliest adopters of these private networks, especially for companies rapidly leaning on the internet of things (IoT) for digitizing production systems and supply chains. Unlike public grids, the cellular infrastructure equipment in private 5G might be owned and operated by the user-enterprise themselves, system integrators, or by carriers. However, given the growing study and exploration of the use of 5G for the development of various technologies, cybercriminals are also looking into exploiting the threats and risks that can be used to intrude into the systems and networks of both users and organizations via this new communication standard. This entry explores how normal user devices can be abused in relation to 5G’s network infrastructure and use cases.]]></description>
		<content:encoded><![CDATA[<p>Attacks on 5G Infrastructure From Users’ Devices <a href="https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html" rel="nofollow">https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html</a></p>
<p>With the growing spectrum for commercial use, usage and popularization of private 5G networks are on the rise. The manufacturing, defense, ports, energy, logistics, and mining industries are just some of the earliest adopters of these private networks, especially for companies rapidly leaning on the internet of things (IoT) for digitizing production systems and supply chains. Unlike public grids, the cellular infrastructure equipment in private 5G might be owned and operated by the user-enterprise themselves, system integrators, or by carriers. However, given the growing study and exploration of the use of 5G for the development of various technologies, cybercriminals are also looking into exploiting the threats and risks that can be used to intrude into the systems and networks of both users and organizations via this new communication standard. This entry explores how normal user devices can be abused in relation to 5G’s network infrastructure and use cases.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1776652</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 05:48:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1776652</guid>
		<description><![CDATA[One of 5Gs Biggest Features Is a Security Minefield https://www.wired.com/story/5g-api-flaws/
TRUE 5G WIRELESS data, with its ultrafast speeds and enhanced security protections, has been slow to roll out around the world. As the mobile technology proliferatescombining expanded speed and bandwidth with low-latency connectionsone of its most touted features is starting to come in to focus. But the upgrade comes with its own raft of potential security exposures. A massive new population of 5G-capable devices, from smart-city sensors to agriculture robots and beyond, are gaining the ability to connect to the internet in places where Wi-Fi isn&#039;t practical or available. Individuals may even elect to trade their fiber-optic internet connection for a home 5G receiver. But the interfaces that carriers have set up to manage internet-of-things data are riddled with security vulnerabilities, according to  research that will be presented on Wednesday at the Black Hat security conference in Las Vegas.]]></description>
		<content:encoded><![CDATA[<p>One of 5Gs Biggest Features Is a Security Minefield <a href="https://www.wired.com/story/5g-api-flaws/" rel="nofollow">https://www.wired.com/story/5g-api-flaws/</a><br />
TRUE 5G WIRELESS data, with its ultrafast speeds and enhanced security protections, has been slow to roll out around the world. As the mobile technology proliferatescombining expanded speed and bandwidth with low-latency connectionsone of its most touted features is starting to come in to focus. But the upgrade comes with its own raft of potential security exposures. A massive new population of 5G-capable devices, from smart-city sensors to agriculture robots and beyond, are gaining the ability to connect to the internet in places where Wi-Fi isn&#8217;t practical or available. Individuals may even elect to trade their fiber-optic internet connection for a home 5G receiver. But the interfaces that carriers have set up to manage internet-of-things data are riddled with security vulnerabilities, according to  research that will be presented on Wednesday at the Black Hat security conference in Las Vegas.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1757111</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 28 Feb 2022 10:10:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1757111</guid>
		<description><![CDATA[Tackling Security Challenges in 5G Networks https://www.enisa.europa.eu/news/enisa-news/tackling-security-challenges-in-5g-networks
The EU Agency for Cybersecurity (ENISA) proposes good practices for the secure deployment of Network Function Virtualisation (NFV) in 5G networks.. Network Function Virtualisation is a new technology in 5G networks, which offers benefits for telecom operators in terms of flexibility, scalability, costs, and network management. However, this technology also introduces new security challenges.]]></description>
		<content:encoded><![CDATA[<p>Tackling Security Challenges in 5G Networks <a href="https://www.enisa.europa.eu/news/enisa-news/tackling-security-challenges-in-5g-networks" rel="nofollow">https://www.enisa.europa.eu/news/enisa-news/tackling-security-challenges-in-5g-networks</a><br />
The EU Agency for Cybersecurity (ENISA) proposes good practices for the secure deployment of Network Function Virtualisation (NFV) in 5G networks.. Network Function Virtualisation is a new technology in 5G networks, which offers benefits for telecom operators in terms of flexibility, scalability, costs, and network management. However, this technology also introduces new security challenges.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/11/29/cyber-security-of-5g-networks/comment-page-1/#comment-1671492</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Feb 2020 08:34:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184951#comment-1671492</guid>
		<description><![CDATA[Mobile Networks Vulnerable to IMP4GT Impersonation Attacks
https://www.securityweek.com/mobile-networks-vulnerable-imp4gt-impersonation-attacks

“IMP4GTallows an active radio attacker to establish arbitrary TCP/IP connections to and from the Internet through the victim’s UE. IMP4GTexploits the lack of integrity protection along with ICMP reflection mechanisms. As a result, the attacker can circumvent any authorization, accounting, or firewall mechanism of the provider,” the researchers conclude.

The researchers, who contacted the GSMA last year to report the discovery, say that all network vendors are equally vulnerable and that their attack works on some 5G networks as well. All devices that connect to an LTE network are affected, including phones, tablets, and appliances.

The vulnerability could be addressed in the now-rolling-out 5G networks by implementing mandatory user-plane integrity protection, but that would require higher costs for network operators — the additional protection would generate more data during transmission — and the replacing of current mobile phones. Base stations would also need to be expanded.

https://imp4gt-attacks.net/]]></description>
		<content:encoded><![CDATA[<p>Mobile Networks Vulnerable to IMP4GT Impersonation Attacks<br />
<a href="https://www.securityweek.com/mobile-networks-vulnerable-imp4gt-impersonation-attacks" rel="nofollow">https://www.securityweek.com/mobile-networks-vulnerable-imp4gt-impersonation-attacks</a></p>
<p>“IMP4GTallows an active radio attacker to establish arbitrary TCP/IP connections to and from the Internet through the victim’s UE. IMP4GTexploits the lack of integrity protection along with ICMP reflection mechanisms. As a result, the attacker can circumvent any authorization, accounting, or firewall mechanism of the provider,” the researchers conclude.</p>
<p>The researchers, who contacted the GSMA last year to report the discovery, say that all network vendors are equally vulnerable and that their attack works on some 5G networks as well. All devices that connect to an LTE network are affected, including phones, tablets, and appliances.</p>
<p>The vulnerability could be addressed in the now-rolling-out 5G networks by implementing mandatory user-plane integrity protection, but that would require higher costs for network operators — the additional protection would generate more data during transmission — and the replacing of current mobile phones. Base stations would also need to be expanded.</p>
<p><a href="https://imp4gt-attacks.net/" rel="nofollow">https://imp4gt-attacks.net/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
