Forum Leaks
5G Network Flaws
Submitted by aneet, 13-04-2021, 12:37 PM, Thread ID: 203344
Thread Closed
13-04-2021, 12:37 PM
#1 As the 5G network is being slowly rolled out in major cities across
the world, An analysis of its network architecture has revealed several potential weaknesses that could be exploited to carry out a slew of cyber assaults, including Denial-of-service (DoS) attacks to deprive subscribers of Internet access and intercept data traffic.
The findings form the basis of a new ?5G Standalone core security research published by London-based cybersecurity firm positive Technologies today, exactly six months after the company released its ?Vulnerabilities in LTE send 5G Networks 2020 report in June detailing high impact flaws in LTE and 5G protocols.
?Key elements of network security include proper configuration of equipment, as well as authentication and authorization of Network elements, Positive Technologies said.
?In the absence of these elements, the network becomes vulnerabilities in the PFCP protocols, and other shortcomings that could lead to the disclosure of unique subscriber identifiers and profile information, and even use internet services at a users expense without their knowledge.
Security Benefits of 5G
One of the keys security benefits offered by 5G is Protection from stingray surveillance and encryption of International Mobile Subscriber Identity (IMSI) numbersunique identifiers that come to every SIM card to identify users of a particular cellular network.
The 5G Core (5GC) also updates the IT Protocol stack by using Transmission Control Protocol (TCP) as the transport layer protocol in place of Stream Control Transmission Protocol (SCTP), HTTP/2 as a substitute
for Diameter protocol for application layer security, and an added TLS layer for encrypted communication b/w all network functions.
Deployed either in standalone or non-standalone modes depending
on their reliance on 4G Evolved Packet Core (EPC) technology, the 5G mobile network is a framework
consisting of as many as nine network functions (NFs) that are responsible for registering subscribers, managing sessions and subscriber profiles, storing subscriber data, and connecting the users (UE or user equipment) to the internet via a base station (GNB).
But the researchers say this very stack of technologies potentially opens the door to attacks on subscribers and the operators network that could be exploited to stage man-in-the-middle and DoS attacks.
DoS and MITMF Attacks
A Problematic aspect of the system architecture is the interface devoted to session management (Session Management Functions or SMF) via protocol called Packet forwarding protocol (PFCP).
MITMF
A bad actor can choose to send a session deletion or modification request PFCP packet, causing a DoS condition that, in turn, leads to disruption of internet access (CVSS score 6.1) and even interception of web traffic (CVSS score 8.3).
Positive Technologies also found issues with the part of the 5G standard that governs Network Repository Function (NRF), which enables registration and discovery of NFs in the control plane, noting that the advisories could add an already existing network function in the repository to serve subscribers via an NF under their control and access user data (CVSS score 8.2).
In a different scenario, the lack of authorization in NRF could be abused to deregister critical components by deleting their corresponding NF profiles from the store, resulting in loss of service to subscribers. Secretly Spy on Subscribers Location
Also of note are a pair of subscriber authentication vulnerabilities that can be leveraged to disclose the subscription Permanent Identifier (SUPI) allocated to information by spoofing a base station.
Separately a Design quirk in the User Data Management (UDM) module that manages subscriber profile data could permit an adversary with ?access to the relevant interface[..] connect to the UDM directly or by impersonating a network service, and then extract all the necessary information, including location data (CVSS score 7.4).
?Access to such data would servery jeopardize security: it allows the attacker to secretly spy on the subscriber, while the latter will never know what is going on, the researcher said.
Last but not least, an attacker can impersonate the Access and Mobility Management Function (AMF) module that takes care of subscriber registration on the network by using a subscribers identification information
to create new stealthy internet sessions for which the subscriber will be billed (CVSS score 8.2)
The Need for Assessment, Monitoring, and Protection
Theres no doubting the security advances offered by 5G, but its also essential that the 5G standard is adequately scrutinized as the number of 5G network users continue to grow each year.
?Operators frequently make errors in equipment configuration with consequences for security, the researchers concluded. ?An important role played by equipment vendors, which are responsible for the technical implementations of all the architecture network protection features
?To prevent the consequences of such attacks, operators must employ timely protection measures, such as the proper configuration of equipment, use of Firewalls on the network edge, and security monitoring, ? the researchers said.
If you found this article helpful then support us for such an Article In the Future.
the world, An analysis of its network architecture has revealed several potential weaknesses that could be exploited to carry out a slew of cyber assaults, including Denial-of-service (DoS) attacks to deprive subscribers of Internet access and intercept data traffic.
The findings form the basis of a new ?5G Standalone core security research published by London-based cybersecurity firm positive Technologies today, exactly six months after the company released its ?Vulnerabilities in LTE send 5G Networks 2020 report in June detailing high impact flaws in LTE and 5G protocols.
?Key elements of network security include proper configuration of equipment, as well as authentication and authorization of Network elements, Positive Technologies said.
?In the absence of these elements, the network becomes vulnerabilities in the PFCP protocols, and other shortcomings that could lead to the disclosure of unique subscriber identifiers and profile information, and even use internet services at a users expense without their knowledge.
Security Benefits of 5G
One of the keys security benefits offered by 5G is Protection from stingray surveillance and encryption of International Mobile Subscriber Identity (IMSI) numbersunique identifiers that come to every SIM card to identify users of a particular cellular network.
The 5G Core (5GC) also updates the IT Protocol stack by using Transmission Control Protocol (TCP) as the transport layer protocol in place of Stream Control Transmission Protocol (SCTP), HTTP/2 as a substitute
for Diameter protocol for application layer security, and an added TLS layer for encrypted communication b/w all network functions.
Deployed either in standalone or non-standalone modes depending
on their reliance on 4G Evolved Packet Core (EPC) technology, the 5G mobile network is a framework
consisting of as many as nine network functions (NFs) that are responsible for registering subscribers, managing sessions and subscriber profiles, storing subscriber data, and connecting the users (UE or user equipment) to the internet via a base station (GNB).
But the researchers say this very stack of technologies potentially opens the door to attacks on subscribers and the operators network that could be exploited to stage man-in-the-middle and DoS attacks.
DoS and MITMF Attacks
A Problematic aspect of the system architecture is the interface devoted to session management (Session Management Functions or SMF) via protocol called Packet forwarding protocol (PFCP).
MITMF
A bad actor can choose to send a session deletion or modification request PFCP packet, causing a DoS condition that, in turn, leads to disruption of internet access (CVSS score 6.1) and even interception of web traffic (CVSS score 8.3).
Positive Technologies also found issues with the part of the 5G standard that governs Network Repository Function (NRF), which enables registration and discovery of NFs in the control plane, noting that the advisories could add an already existing network function in the repository to serve subscribers via an NF under their control and access user data (CVSS score 8.2).
In a different scenario, the lack of authorization in NRF could be abused to deregister critical components by deleting their corresponding NF profiles from the store, resulting in loss of service to subscribers. Secretly Spy on Subscribers Location
Also of note are a pair of subscriber authentication vulnerabilities that can be leveraged to disclose the subscription Permanent Identifier (SUPI) allocated to information by spoofing a base station.
Separately a Design quirk in the User Data Management (UDM) module that manages subscriber profile data could permit an adversary with ?access to the relevant interface[..] connect to the UDM directly or by impersonating a network service, and then extract all the necessary information, including location data (CVSS score 7.4).
?Access to such data would servery jeopardize security: it allows the attacker to secretly spy on the subscriber, while the latter will never know what is going on, the researcher said.
Last but not least, an attacker can impersonate the Access and Mobility Management Function (AMF) module that takes care of subscriber registration on the network by using a subscribers identification information
to create new stealthy internet sessions for which the subscriber will be billed (CVSS score 8.2)
The Need for Assessment, Monitoring, and Protection
Theres no doubting the security advances offered by 5G, but its also essential that the 5G standard is adequately scrutinized as the number of 5G network users continue to grow each year.
?Operators frequently make errors in equipment configuration with consequences for security, the researchers concluded. ?An important role played by equipment vendors, which are responsible for the technical implementations of all the architecture network protection features
?To prevent the consequences of such attacks, operators must employ timely protection measures, such as the proper configuration of equipment, use of Firewalls on the network edge, and security monitoring, ? the researchers said.
If you found this article helpful then support us for such an Article In the Future.
Users browsing this thread: 3 Guest(s)