Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » In LTE networks and 5G more than 100 security disadvantages
Global Security

In LTE networks and 5G more than 100 security disadvantages

AdminBy AdminJanuary 24, 2025No Comments3 Mins Read
LTE and 5G Network Implementations
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 24 2025 gRavi LakshmananSecurity / vulnerability of telecommunications

Introduction of LTE and 5G networks

A group of scientists has revealed details of more than 100 security vulnerabilities that affect the LTE and 5G introduction that can be used by the attacker to disrupt access to the service and even fixed in the main cellular network.

The 119 vulnerabilitiesAppointed 97 unique CVE ID, cover seven LTE – Open5gs. Magma. Openair interface. Atonate. Sd-core. NEXTEPC. SRSR – and three 5G – Open5gs, Magma, Openairinterface, according to researchers at Florida University and North Carolina State University.

Cybersecurity

The conclusions were described in detail in a study called “Ransacked: Domain-informed approach for Fuzzing LTE and 5G Ran-Core Interfaces”.

“Each of the> 100 vulnerabilities below can be used to constantly violate the entire cellular communication (telephone calls, messaging and data transmission) at the level of the whole city,” the researchers said.

“The attacker can continuously remove the Mobility Management Entity (MME) or Access and Mobility Management Function (AMF) on the LTE/5G network, respectively, simply sending one small network package as a non-aid user (without SIM card). required). “

The opening is the result of a Exercise by phasingRelated to Ransacked by researchers against the radio network (Wound) – the main interfaces that are able to take the introduction directly from mobile phones and base stations.

Researchers have said that some revealed vulnerabilities are related to the overflow of the buffer and memory damage that can be used to hack the main cellular network, and use this access to monitor the mobile phone location and connection information for all city level subscribers. Purposeful attacks on specific subscribers, as well as further malicious actions on the network itself.

Moreover, the identified deficiencies fall into two broad categories: those that can be used by any non -austean mobile device, and those that can become an enemy weapon who hacked base station or A fumtosot.

Cybersecurity

Of the 119 revealed vulnerabilities, 79 were found in the MME, 36 implementations in AMF and four in SGW. Twenty-five drawbacks lead to Non-Aaccess Stratum (NAS) ATTO attacks that can be carried out using any mobile phone.

“The introduction of Femetasot for home use, and then more easily available GnodeB base stations in 5G deployment, is a further shift in security dynamics: where the Ran’s physically blocked equipment is now openly exposed to physical threats,” the study noted.

“Our work explores the consequences of this last area, allowing effective phasis -interfaces, which have historically been indirectly safe, but now face direct threats.”

Found this article interesting? Keep track of us Twitter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.