Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy
Abstract
:1. Introduction
2. Background on 5G NSA
3. Attacks on 5G NSA
3.1. Active Attacks
3.1.1. Radio Jamming
3.1.2. Signal Overshadowing
Attacks Exploiting SIB Messages
Attacks Exploiting Paging Messages
Attack Exploiting Unicast Messages
3.1.3. Message Attacks
Fake Base Station
- (A)
- Unicast Message Attacks. These are attacks where the attacker originates and sends a unicast message to the victim UE after it has camped on its cell (fake BS). The adversary exploits the fact that certain messages sent from the network are accepted by an UE without integrity protection [21]. Selected attacks in this category are described below.
- The Downgrade Attack allows the adversary to downgrade the user to a 2G/3G network [8]. The attack is based on the specification flaw that a UE accepts the TAU Reject message without an integrity check. Specifically, there is no need for the establishment of mutual authentication and security contexts between the UE and the network for accepting the message. In order to perform the attack, the adversary needs to operate a fake BS on a TAC different from the real enodeB to trigger a TAU message from the victim UE. Once the victim UE sends a TAU request, the fake BS replies with a TAU Reject message, including an EMM cause. If the cause included is “EPS services not allowed,” the victim UE disconnects from the current network and tries to connect to a nearby 2G/3G BS if available. Later, the UE tries to reconnect to the legitimate BS after the expiry of a timer [24]. Toggling airplane mode or rebooting the phone could nullify the effect of this attack.
- The Numb Attack allows an adversary to severely disrupt the service of a victim UE by performing a DoS attack [12]. The attack is based on the specification flaw that a UE accepts the Authentication Reject message without an integrity check. In order to perform the attack, the adversary needs to set up a malicious enodeB (BS). Once the UE connects to the fake enodeB, it needs to reply with the Authentication Reject message, irrespective of the victim UE context. After receiving this message, any cellular services on the UE are disabled as the UE enters the “EU3 Roaming not allowed” state. Later, the UE tries to reconnect to the 4G BS after the expiry of a timer [24]. Toggling airplane mode or rebooting the phone could nullify the effect of this attack. Similar attacks are also possible with Service Reject/Attach Reject messages.
- The Identity Leak Attack exploits a specification flaw of accepting an Identity Request for IMSI numbers without an integrity check [21]. In order to perform the attack, the adversary needs to operate a fake BS. Once the UE connects to such a prepared BS, it needs to send an Identity Request back to the UE. Upon receipt of the Identity Request, the victim UE replies with an Identity Response message containing its IMSI in plain text.
- (B)
- Paging Message Attacks Paging messages are cryptographically unprotected. A fake BS is required to perform these attacks. Selected attacks in this category are described below.
- Hijacking Paging Channels allows an adversary to deny any service to the UE (e.g., incoming call or SMS) [12]. To perform this attack, the adversary first needs to determine the UE’s paging cycle. After that, the adversary needs to operate a fake BS and broadcast empty paging messages using higher signaling power at the paging occasions of the UE.
- The Stealthy Kicking-off Attack aims to force a victim UE to detach from a network surreptitiously [12]. In order to perform this attack, the adversary first needs to hijack the victim’s paging channel. After that, the adversary needs to send prepared paging messages with one of the paging records containing the IMSI of the victim UE. Upon the reception of the generated paging message containing its IMSI, the UE disconnects from the EPC and sends an Attach Request message.
- The Panic Attack allows an adversary to inject fake emergency paging messages [12]. It could be used by a malicious organization to create a situation of artificial emergency or chaos among the public. In order to perform the attack, the adversary needs to send paging messages with empty records but with fake emergency warnings on all possible paging occasions to ensure numerous UEs are affected. The paging messages can be generated by setting the bits related to earthquake and tsunami warning system (ETWS). Upon reception of this message, the UE displays warning messages sent by the attacker. Researchers further revealed that with four fake base stations operating at one-watt power, it is possible to send fake presidential warning messages to a stadium of 50,000 seat capacity with an impressive success rate of 90 percent [9].
- The Energy Depletion Attack forces the victim UE to perform expensive cryptographic operations repeatedly, thus depleting its battery at a faster rate [12]. In order to perform the attack, the adversary can force the UE to carry out the expensive attach procedure repeatedly by sending a paging message containing the IMSI between two successive attach procedures. Alternatively, in case the adversary knows the Globally Unique Temporary Identifier (GUTI) of the victim, it can page the UE using the GUTI, which forces the UE to respond with a Service Request message.
Fake User Equipment
MITM Relay
- (A)
- Tampering. In these attacks, the MITM attacker tampers with some messages before sending them to the recipient. Selected attacks belonging to this category are described below.
- In an Alter Attack, the adversary exploits the lack of integrity protection for user plane data to perform a chosen ciphertext attack [28]. Specifically, the adversary performs a Domain Name System (DNS) redirection attack by manipulating the destination IP address of a DNS request, redirecting the request to a malicious server. In order to perform the attack, the adversary operates a malicious relay between the UE and the enodeB and applies a manipulation mask on the DNS packet to change its destination IP address to a malicious IP address. Then, it forwards the packets to the external network (e.g., the Internet). At the core network, the malicious DNS request is decrypted and routed to the malicious DNS server, which replies with a spoofed DNS response.
- An IMP4GT Attack is an extension of the Alter attack. In this attack, the adversary exploits the missing integrity protection for user plane data and the reflection mechanism of the IP stack mobile operating system to impersonate a user toward the network and vice versa [29]. In the uplink impersonation variant, the adversary can access the Internet using the victim’s IP address. In the downlink variant, the adversary establishes a TCP/IP connection to the phone to bypass the firewall mechanisms.
- The Null Ciphering Attack [30] allows the UE to establish an unencrypted radio connection with gnodeB. It occurs due to the implementation flaw within the network of not rejecting UEs with invalid UE Additional Security Capabilities and the implementation flaw in the UE of not verifying replayed UE Additional Security Capabilities and Hash of the Attach message. These additional capabilities specify information about the supported algorithms for protecting the data transferred over gnodeB in 5G NSA. The capabilities are sent in the Attach Request message and are later replayed back to detect manipulation. In order to perform the attack, the adversary needs to set up an MITM relay to lure the UE to connect to it. Once the UE sends the Attach request message to the MITM relay, the attacker modifies the UE Additional Security Capabilities to include support only for null ciphering (NEA0). The network receives this message and replays the UE Additional Security Capabilities back to the UE in an integrity-protected NAS Security mode command without checking the capabilities. In the next phase, the MME would inform the target gnodeB about the additional security capabilities. Since the only ciphering algorithm left in the 5G security capability set is NEA0, enodeB would instruct the UE to establish an unencrypted radio connection to gnodeB via the RRC Connection Reconfiguration message. Note that it is also possible to perform a battery draining attack on IoT devices (implementation flaw) or a DoS attack [8] (implementation flaw) using a similar attack procedure.
- In the Radio Service Hijacking attack [8], the adversary exploits an implementation flaw where the enodeB requests the UE Radio Capabilities before establishing the RRC security. The enodeB requests the Radio Capability from the UE by sending a UECapabilityEnquiry message, and the UE responds with the UECapabilityInformation message. In order to perform the attack, the adversary operates an MITM relay at a different TAC and lures the UE into initiating a new registration procedure via the relay. After the NAS security setup, the relay forwards the UECapabilityEnquiry message to the UE, receiving a plain text UECapabilityInformation response. The relay then alters this message to downgrade the CAT category and disable several features and supported bands. The altered message is then forwarded to the legitimate network, and the UE is released using an RRC release message. These altered capabilities are stored in the network for future use, leading to lower data rates. Moreover, the UE would be handed over to a 3G/2G base station during voice calls due to missing 4G/5G bands.
- (B)
- Relaying. In these attacks, the MITM attacker relays messages (or forwards messages) between the victim UE and the legitimate enodeB without tampering with them. An attack that belongs to this category is described below.
- An Authentication Relay Attack allows a malicious UE to connect to the EPC without possessing proper credentials [12]. The implications include the ability to spoof a location to the core network (location poisoning) as well as conduct DoS attacks. This attack is performed using an MITM relay such that the malicious UE and malicious enodeB parts of the relay are connected via a private connection. In order to perform the attack, the adversary first needs to force the UE to disconnect from the EPC and connect to the fake BS part of the relay. Once the victim UE connects to the fake BS and sends an Attach Request, the malicious enodeB forwards it to the remote malicious UE, and the malicious UE forwards it to the legitimate BS. Similarly, the malicious UE forwards the reply sent by the core network to the malicious BS, which forwards it to the victim UE. Following the same principle, other messages involved in the attach procedure are exchanged, thus allowing a malicious UE to connect to the core network without proper credentials.
3.2. Passive Attacks
4. Motivation
5. Methodology
5.1. Components
- 5G NSA Network We use the Amarisoft Callbox Classic [37] as a 5G NSA network. The Callbox provides a closed-source 3GPP compliant enodeB, a gnodeB for the RAN, and an EPC and 5GC for the core network. It can be configured to act as a mobile network for different generations and standards (i.e., 5G SA, 5G NSA, LTE M, LTE NB-IoT).
- Fake 4G Network Since 5G NSA is based on LTE control traffic, a fake 4G network can act as a fake BS for a UE connected to the 5G NSA network. We have set up the malicious enodeB by adapting the srsRAN [38] software package. srsRAN is an open-source software radio suite for 4G implemented in C/C++. The software runs on a Linux-based PC (Intel Core i5 7th Gen laptop). A USRP B210 [39] acts as the radio front end for our fake 4G network. It is connected to the host-based PC running the modified srsRAN software. The fake BS needs to be configured to broadcast Mobile Number Code (MNC) and Mobile Country Code (MCC) numbers identical to the 5G NSA BS. It must also be operated using higher power than nearby enodeBs to lure the victim UE to connect to it. Our laboratory setup consists of only one 5G NSA BS under our control, operating at a particular frequency. Operating the fake 4G BS at this frequency could be considered analogous to a real-world situation, where the attacker usually operates the fake BS at the highest priority frequency.
- 2G Network We have set up a 2G network using the OpenBTS [40] framework. It runs on a Linux-based PC (Intel Core i5 7th Gen laptop). OpenBTS is a C++ application that implements the GSM cellular stack. A USRP B210 acts as the radio front end for our 2G network. It is connected to the host-based PC running the OpenBTS software.
- COTS UEs We used the following eight 5G NSA COTS UEs for the tests: Samsung A40, Huawei P40, Huawei Mate40 Pro, Oppo Find X3 Neo 5G, Google Pixel 7 Pro, Samsung Galaxy S20FE, Samsung Galaxy S21FE and iPhone 12. The UEs are connected to the Amarisoft Callbox using test sim cards that were shipped with the system.
5.2. Procedure to Verify the Attacks
6. Results
7. Summary and Discussion
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
3GPP | 3rd Generation Partnership Project |
BS | base station |
COTS | Commercial Off-the-Shelf |
CapEx | Capital Expenditure |
DoS | Denial of Service |
DNS | Domain Name System |
EPC | Evolved Packet Core |
HSS | Home Subscriber Service |
eMBB | Enhanced Mobile Broadband |
ETWS | earthquake and tsunami warning system |
GUTI | Globally Unique Temporary Identifier |
IMSI | International Mobile Subscriber Identity |
TMSI | Temprary Mobile Subscriber Identity |
LTE | Long-Term Evolution |
MAC | Message Authentication Code |
MNO | Mobile Network Operator |
MCC | Mobile Country Code |
MNC | Mobile Number Code |
NSA | Non-Stand-Alone |
NAS | Non-Access Stratum |
NFV | Network Functions Virtualization |
NR | New Radio |
MITM | man-in-the-middle |
MN | Master Node |
MME | Mobility Management Entity |
mMTC | Massive Machine Type Communications |
PC | personal computer |
P-GW | PDN Gateway |
RAN | Radio Access Network |
SDN | Software-Defined Networking |
SDR | Software-Defined Radio |
SN | Secondary Node |
SA | Stand-Alone |
SIB | System Information Block |
SIM | Subscriber Identity Module |
SIB | System Information Block |
S-TMSI | Serving Temporary Mobile Subscriber Identity |
S-GW | Serving Gateway |
PRACH | Physical Random Access Channel |
PBCH | Physical Broadcast Channel |
TAC | Tracking Area Code |
TAU | Tracking Area Update |
TMSI | Temporary Mobile Subscriber Identity |
URLLC | ultra-reliable low-latency communication |
UE | User Equipment |
References
- Ericsson. Ericsson Mobility Report; Technical Report EAB-22:010742 Uen Rev D; Ericsson: Stockholm, Sweden, 2023. [Google Scholar]
- Bundesnetzagentur. Pressemitteilung—Bundesnetzagentur Aktualisiert Darstellung der Netzabdeckung mit 5G. Available online: https://www.bundesnetzagentur.de/SharedDocs/Downloads/DE/Allgemeines/Presse/Pressemitteilungen/2022/20221123_5G.pdf?__blob=publicationFile&v=2 (accessed on 30 November 2023).
- Zhang, X.; Kunz, A.; Schröder, S. Overview of 5G security in 3GPP. In Proceedings of the 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, Finland, 18–20 September 2017; pp. 181–186. [Google Scholar] [CrossRef]
- Cao, J.; Ma, M.; Li, H.; Ma, R.; Sun, Y.; Yu, P.; Xiong, L. A Survey on Security Aspects for 3GPP 5G Networks. IEEE Commun. Surv. Tutor. 2020, 22, 170–195. [Google Scholar] [CrossRef]
- GSA. 5G-Standalone November 2023 Summary. 2023. Available online: https://gsacom.com/paper/5g-market-snapshot-february-2023 (accessed on 30 November 2023).
- Kliks, A.; Dryjanski, M.; Ram, V.; Wong, L.; Harvey, P. Towards Autonomous Open Radio Access Networks. ITU J. Future Evol. Technol. 2023, 4, 251–268. [Google Scholar] [CrossRef]
- Park, S.; Shaik, A.; Borgaonkar, R.; Seifert, J.P. Anatomy of Commercial IMSI Catchers and Detectors. In Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society (WPES’19), London, UK, 11 November 2019; pp. 74–86. [Google Scholar] [CrossRef]
- Shaik, A.; Borgaonkar, R.; Park, S.; Seifert, J.P. New Vulnerabilities in 4G and 5G Cellular Access Network Protocols: Exposing Device Capabilities. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), Miami, FL, USA, 15–17 May 2019; pp. 221–231. [Google Scholar] [CrossRef]
- Lee, G.; Lee, J.; Lee, J.; Im, Y.; Hollingsworth, M.; Wustrow, E.; Grunwald, D.; Ha, S. This is Your President Speaking: Spoofing Alerts in 4G LTE Networks. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, Republic of Korea, 17–21 June 2019; pp. 404–416. [Google Scholar] [CrossRef]
- Mjølsnes, S.F.; Olimid, R.F. Easy 4G/LTE IMSI Catchers for Non-Programmers. In Proceedings of the Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, 8–30 August 22017; Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K., Eds.; Springer: Cham, Switzerland, 2017; Volume 10446. [Google Scholar] [CrossRef]
- Rupprecht, D. Enhancing the Security of 4G and 5G Mobile Networks on Protocol Layer Two. Ph.D. Thesis, Ruhr-Universität Bochum, Universitätsbibliothek, Bochum, Germany, 2021. [Google Scholar] [CrossRef]
- Hussain, S.; Chowdhury, O.; Mehnaz, S.; Bertino, E. LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. In Proceedings of the 25th Annual Network and Distributed System Security Symposium, (NDSS), San Diego, CA, USA, 18–21 February 2018. [Google Scholar] [CrossRef]
- Aijaz, A. Private 5G: The Future of Industrial Wireless. IEEE Ind. Electron. Mag. 2020, 14, 136–145. [Google Scholar] [CrossRef]
- 3GPP. Universal Mobile Telecommunications System (UMTS); Numbering, Addressing and Identification: 3GPP TS 23.003 V16.3.0 Release 16 (2020-10). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729 (accessed on 30 November 2023).
- El Rhayour, A.; Mazri, T. 5G Architecture: Deployment scenarios and options. In Proceedings of the 2019 International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Rome, Italy, 27–29 November 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Ondrusova, S.; Kim, D. 5G Implementation Guidelines: NSA Option 3; Technical Report; GSM Association: London, UK, 2020. [Google Scholar]
- Liu, G.; Huang, Y.; Chen, Z.; Liu, L.; Wang, Q.; Li, N. 5G Deployment: Standalone vs. Non-Standalone from the Operator Perspective. Comm. Mag. 2020, 58, 83–89. [Google Scholar] [CrossRef]
- 3GPP. Study on 5G Security Enhancement against False Base Stations (FBS); Technical Report (TR): 3GPP TR 33.809 V18.1.0 Release 18 (2023-09). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729 (accessed on 30 November 2023).
- Aziz, F.M.; Shamma, J.S.; Stüber, G.L. Resilience of LTE networks against smart jamming attacks. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 734–739. [Google Scholar] [CrossRef]
- Yang, H.; Bae, S.; Son, M.; Kim, H.; Kim, S.M.; Kim, Y. Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. In Proceedings of the 28th USENIX Conference on Security Symposium, Santa Clara, CA, USA, 14–16 August 2019; pp. 55–72. [Google Scholar]
- 3GPP. Universal Mobile Telecommunications System (UMTS); LTE; 5G; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Technical Specification (TS): 3GPP TS 24.301 V15.6.0 Release 15 (2019-04). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729 (accessed on 30 November 2023).
- Erni, S.; Kotuliak, M.; Leu, P.; Roeschlin, M.; Capkun, S. AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks. In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (MobiCom ’22), Sydney, Australia, 17–21 October 2022; pp. 743–755. [Google Scholar] [CrossRef]
- Kotuliak, M.; Erni, S.; Leu, P.; Röschlin, M.; Capkun, S. LTrack: Stealthy Tracking of Mobile Phones in LTE. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 1291–1306. [Google Scholar] [CrossRef]
- 3GPP. Digital Cellular Telecommunications System (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Mobile Radio Interface Layer 3 Specification; Core Network Protocols; Technical Specification (TS): 3GPP TS 24.008: V13.0.0 Release 13 (2016-10). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729 (accessed on 30 November 2023).
- 3GPP. Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification; Technical Specification (TS): 3GPP TS 36.331 V13.0.0 Release 13 (2016-01). Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729 (accessed on 30 November 2023).
- Kim, H.; Lee, J.; Lee, E.; Kim, Y. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 1153–1168. [Google Scholar] [CrossRef]
- Karim, I.; Hussain, S.; Bertino, E. ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations. In Proceedings of the 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), Virtual, 7–10 July 2021; pp. 773–785. [Google Scholar] [CrossRef]
- Rupprecht, D.; Kohls, K.; Holz, T.; Pöpper, C. Breaking LTE on Layer Two. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 1121–1136. [Google Scholar] [CrossRef]
- Rupprecht, D.; Kohls, K.; Holz, T.; Pöpper, C. IMP4GT: IMPersonation Attacks in 4G NeTworks. In Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 23–26 February 2020. [Google Scholar] [CrossRef]
- Karakoc, B.; Fürste, N.; Rupprecht, D.; Kohls, K. Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’23), Guildford, UK, 29 May–1 June 2023; pp. 97–108. [Google Scholar] [CrossRef]
- Kotuliak, M. LTE Monitoring. Master’s Thesis, ETH Zurich, Zurich, Switzerland, 2020. [Google Scholar] [CrossRef]
- Rupprecht, D.; Kohls, K.; Holz, T.; Pöpper, C. Call Me Maybe: Eavesdropping Encrypted LTE Calls with ReVoLTE. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020; USENIX Association: Berkeley, CA, USA, 2020; pp. 73–88. [Google Scholar]
- Hoang, T.D.; Park, C.; Son, M.; Oh, T.; Bae, S.; Ahn, J.; Oh, B.; Kim, Y. LTESniffer: An Open-Source LTE Downlink/Uplink Eavesdropper. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’23), Guildford, UK, 29 May–1 June 2023; pp. 43–48. [Google Scholar] [CrossRef]
- Kwon, S.; Park, S.; Cho, H.; Park, Y.; Kim, D.; Yim, K. Towards 5G-Based IoT Security Analysis against Vo5G Eavesdropping. Computing 2021, 103, 425–447. [Google Scholar] [CrossRef]
- Park, S.; Kim, D.; Park, Y.; Cho, H.; Kim, D.; Kwon, S. 5G Security Threat Assessment in Real Networks. Sensors 2021, 21, 5524. [Google Scholar] [CrossRef] [PubMed]
- Park, S.; You, I.; Park, H.; Kim, D. Analyzing RRC Replay Attack and Securing Base Station with Practical Method. In Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES ’22), Vienna, Austria, 23–26 August 2022. [Google Scholar] [CrossRef]
- Amarisoft. AMARI Callbox Classic Datasheet. 2021. Available online: https://www.amarisoft.com/app/uploads/2021/10/AMARI-Callbox-Classic.pdf (accessed on 30 November 2023).
- SRS. srsRAN—Open Source SDR 4G/5G Software Suite from Software Radio Systems. 2023. Available online: https://github.com/srsran/ (accessed on 30 November 2023).
- Ettus Research. USRP B210 Datasheet. Available online: https://www.ettus.com/all-products/ub210-kit/ (accessed on 30 November 2023).
- Networks, R. Getting Started with OpenBTS. Available online: https://github.com/RangeNetworks/openbts (accessed on 30 November 2023).
- 3GPP SA3. S3-152498; Anaheim, US LS on Backoff Timer; Technical Report S3-152498. 2015. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729 (accessed on 30 November 2023).
- Shaik, A. Towards Secure 4G and 5G Access Network Protocols. Ph.D. Thesis, Technische Universität Berlin, Berlin, Germany, 2020. [Google Scholar] [CrossRef]
- Erni, S. Protocol-Aware Reactive LTE Signal Overshadowing and its Applications in DoS Attacks. Master’s Thesis, ETH Zurich, Zurich, Switzerland, 2020. [Google Scholar] [CrossRef]
- Garbelini, M.E.; Shang, Z.; Chattopadhyay, S.; Sun, S.; Kurniawan, E. Towards Automated Fuzzing of 4G/5G Protocol Implementations Over the Air. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 86–92. [Google Scholar] [CrossRef]
UE | IMSI Leaked | Numb Attack (Quick Recovery) | Downgrade Attack (Quick Recovery) |
---|---|---|---|
Samsung Galaxy A40 | Yes | No | No |
Huawei P40 | Yes | Yes | Yes |
Huawei Mate40 Pro | Yes | Yes | Yes |
Oppo Find X3 Neo 5G | Yes | No | No |
Google Pixel 7 Pro | Not tested | Yes | Yes |
Samsung Galaxy S20FE | Not tested | No | No |
Samsung Galaxy S21FE 5G | Not tested | Yes | Yes |
iPhone 12 | Not tested | No | No |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wani, M.S.; Rademacher, M.; Horstmann, T.; Kretschmer, M. Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy. J. Cybersecur. Priv. 2024, 4, 23-40. https://doi.org/10.3390/jcp4010002
Wani MS, Rademacher M, Horstmann T, Kretschmer M. Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy. Journal of Cybersecurity and Privacy. 2024; 4(1):23-40. https://doi.org/10.3390/jcp4010002
Chicago/Turabian StyleWani, Mohamad Saalim, Michael Rademacher, Thorsten Horstmann, and Mathias Kretschmer. 2024. "Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy" Journal of Cybersecurity and Privacy 4, no. 1: 23-40. https://doi.org/10.3390/jcp4010002
APA StyleWani, M. S., Rademacher, M., Horstmann, T., & Kretschmer, M. (2024). Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy. Journal of Cybersecurity and Privacy, 4(1), 23-40. https://doi.org/10.3390/jcp4010002