We use cookies. By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechGeer Black Text Logo Light Header TechGeer Main Logo
  • News
    • AI News
    • Cybersecurity News
    • Streaming News
    • Tech News
  • Statistics
    • Entertainment
    • Gadgets and Hardware
    • Internet Security
    • Lifestyle
    • Marketing and Finance
    • Science
    • Web and Software
    • Workplace and Business
  • Streaming
  • Security
    • VPN
    • Spy
    • Antivirus
    • Torrenting
  • AI
  • About Us
    • Why Trust Us
    • Editorial Policy
    • Our Writers and Editors
    • Terms of Use
    • How We Make Money
    • Get in Touch
Reading: Hackers could exploit major 5G baseband security flaw, researchers say
TechGeerTechGeer
Search
  • News
    • AI News
    • Cybersecurity News
    • Streaming News
    • Tech News
  • Statistics
    • Entertainment
    • Gadgets and Hardware
    • Internet Security
    • Lifestyle
    • Marketing and Finance
    • Science
    • Web and Software
    • Workplace and Business
  • Streaming
  • Security
    • VPN
    • Spy
    • Antivirus
    • Torrenting
  • AI
  • About Us
    • Why Trust Us
    • Editorial Policy
    • Our Writers and Editors
    • Terms of Use
    • How We Make Money
    • Get in Touch
Have an existing account? Sign In
Follow US
  • Terms of Use
  • Privacy Policy
© 2024 TechGeer.com. All Rights Reserved.
Home » News » Tech News » Hackers could exploit major 5G baseband security flaw, researchers say

Hackers could exploit major 5G baseband security flaw, researchers say

Mahrukh Rubab
Last updated: September 3, 2024 4:22 pm
By Mahrukh Rubab - Senior Tech Writer
3 Min Read
Share
We conduct in-depth independent evaluations before making a recommendation. If you buy through links on our site, we may earn a fee that supports our mission.
Hackers could exploit major 5G baseband security flaw, researchers say

Hackers could exploit serious security flaws in 5G basebands, putting mobile users’ privacy at risk.

A group of researchers from Pennsylvania State University has discovered critical flaws in several basebands used in 5G networks. These flaws may affect mobile users globally.

The main issues were highlighted at the Black Hat cyber security meeting held in Las Vegas and documented in a paper posted on August 7th.

For this purpose, the team created the 5G base checker tool. This tool analyzes basebands by industry leaders such as Samsung, MediaTech, and Qualcomm.

These basebands are present in the smartphones such as Google Pixel, Oppo, Oneplus, Motorola, and even Samsung.

Unveiling 5G base checker

The paper “Logic Gone Astray: A Security Analysis Framework for the Control Plan Protocols of 5G Basebands” presents the development and functioning of a 5G base checker.

It uses black box automata learning to develop a model of baseband behaviors. It then detects anomalous behaviors in security properties that may indicate vulnerability.

The researchers identified 22 implementation concerns. Out of these, 13 were readily exploitable concerns, and two were compatibility issues.

The team of researchers has made the 5G base checker tool available on Git Hub. The team includes  Kai Tu, Yilu Dong, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain.

It has made it accessible to assist other researchers in uncovering more security flaws in 5G technologies.

Among all the other threats found, the most worrying threat was the “5G AKA bypass,” a crucial flaw in a popular 5G baseband. This flaw could let hackers intercept internet traffic and launch phishing text messages.

The researchers stressed the peril of this vulnerability.

They said:

“Exploiting this flaw ignores all the security assurances of 5G technology. It renders users’ security and privacy fully exposed.”

Syed Rafiul Hussain, an Assistant professor at Penn State, highlighted the importance of these findings in a social media post. “This two-scale and automation-friendly assessment uncovered 22 vulnerabilities. Of these 22, 13 are exploitable across 17 5G basebands.”

In the study, the researchers support the necessity of enhancing the protective characteristics of 5D technologies against possible cyber threats.

Share This Article
Facebook X LinkedIn Reddit Copy Link
ByMahrukh Rubab
Senior Tech Writer
Follow:
Mahrukh is a talented streaming and tech author who has contributed to quality sites in the niche, such as NetflixSavvy and TechReport, providing captivating content that illuminates the world of streaming entertainment with a great deal of knowledge and expertise.
Leave a Comment Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related Articles

US Government takes on Google’s Ad tech monopoly in antitrust trial
Tech News

US Government takes on Google’s ad tech monopoly in antitrust trial

September 16, 2024
Apple postpones the launch of new artificial intelligence features
Tech News

Apple postpones the launch of new artificial intelligence features

July 31, 2024
Today in Apple history: Apple acquires the company behind Touch ID
Tech News

Today in Apple history: Apple acquires the company behind Touch ID

July 30, 2024
Integrity in Communication Ensuring Plagiarism-Free Content with ChatGPT
Tech News

Integrity in communication: Ensuring plagiarism-free content with ChatGPT

July 31, 2024
TechGeer Black Text Logo Light Header TechGeer Main Logo

Discover the latest in tech at TechGeer.com: AI, software, VPNs, privacy, monitoring, gaming, streaming, and alternatives. Your go-to source for cutting-edge news and guides in the digital world.

Navigation

  • News
  • Statistics
  • Security and Privacy Guides
  • Monitoring
  • VPN
  • Torrenting
  • Streaming & Geoblocking
  • Software and Apps
  • Artificial Intelligence

Company

  • About Us
  • Why Trust Us
  • Editorial Policy
  • Disclaimer
  • How We Evaluate
  • Career
  • Contact

Follow Us

TechGeer Ltd
Office 1214 727 51
High Streat, East
London E72JA
United Kingdom

© 2024 TechGeer.com. All Rights Reserved.
  • Terms of Use
  • Privacy Policy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up