Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » In LTE networks and 5G more than 100 security disadvantages
Global Security

In LTE networks and 5G more than 100 security disadvantages

AdminBy AdminJanuary 24, 2025No Comments3 Mins Read
LTE and 5G Network Implementations
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 24 2025 gRavi LakshmananSecurity / vulnerability of telecommunications

Introduction of LTE and 5G networks

A group of scientists has revealed details of more than 100 security vulnerabilities that affect the LTE and 5G introduction that can be used by the attacker to disrupt access to the service and even fixed in the main cellular network.

The 119 vulnerabilitiesAppointed 97 unique CVE ID, cover seven LTE – Open5gs. Magma. Openair interface. Atonate. Sd-core. NEXTEPC. SRSR – and three 5G – Open5gs, Magma, Openairinterface, according to researchers at Florida University and North Carolina State University.

Cybersecurity

The conclusions were described in detail in a study called “Ransacked: Domain-informed approach for Fuzzing LTE and 5G Ran-Core Interfaces”.

“Each of the> 100 vulnerabilities below can be used to constantly violate the entire cellular communication (telephone calls, messaging and data transmission) at the level of the whole city,” the researchers said.

“The attacker can continuously remove the Mobility Management Entity (MME) or Access and Mobility Management Function (AMF) on the LTE/5G network, respectively, simply sending one small network package as a non-aid user (without SIM card). required). “

The opening is the result of a Exercise by phasingRelated to Ransacked by researchers against the radio network (Wound) – the main interfaces that are able to take the introduction directly from mobile phones and base stations.

Researchers have said that some revealed vulnerabilities are related to the overflow of the buffer and memory damage that can be used to hack the main cellular network, and use this access to monitor the mobile phone location and connection information for all city level subscribers. Purposeful attacks on specific subscribers, as well as further malicious actions on the network itself.

Moreover, the identified deficiencies fall into two broad categories: those that can be used by any non -austean mobile device, and those that can become an enemy weapon who hacked base station or A fumtosot.

Cybersecurity

Of the 119 revealed vulnerabilities, 79 were found in the MME, 36 implementations in AMF and four in SGW. Twenty-five drawbacks lead to Non-Aaccess Stratum (NAS) ATTO attacks that can be carried out using any mobile phone.

“The introduction of Femetasot for home use, and then more easily available GnodeB base stations in 5G deployment, is a further shift in security dynamics: where the Ran’s physically blocked equipment is now openly exposed to physical threats,” the study noted.

“Our work explores the consequences of this last area, allowing effective phasis -interfaces, which have historically been indirectly safe, but now face direct threats.”

Found this article interesting? Keep track of us Twitter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.