Hackers could exploit serious security flaws in 5G basebands, putting mobile users’ privacy at risk.
A group of researchers from Pennsylvania State University has discovered critical flaws in several basebands used in 5G networks. These flaws may affect mobile users globally.
The main issues were highlighted at the Black Hat cyber security meeting held in Las Vegas and documented in a paper posted on August 7th.
For this purpose, the team created the 5G base checker tool. This tool analyzes basebands by industry leaders such as Samsung, MediaTech, and Qualcomm.
These basebands are present in the smartphones such as Google Pixel, Oppo, Oneplus, Motorola, and even Samsung.
Unveiling 5G base checker
The paper “Logic Gone Astray: A Security Analysis Framework for the Control Plan Protocols of 5G Basebands” presents the development and functioning of a 5G base checker.
It uses black box automata learning to develop a model of baseband behaviors. It then detects anomalous behaviors in security properties that may indicate vulnerability.
The researchers identified 22 implementation concerns. Out of these, 13 were readily exploitable concerns, and two were compatibility issues.
The team of researchers has made the 5G base checker tool available on Git Hub. The team includes Kai Tu, Yilu Dong, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain.
It has made it accessible to assist other researchers in uncovering more security flaws in 5G technologies.
Among all the other threats found, the most worrying threat was the “5G AKA bypass,” a crucial flaw in a popular 5G baseband. This flaw could let hackers intercept internet traffic and launch phishing text messages.
The researchers stressed the peril of this vulnerability.
They said:
“Exploiting this flaw ignores all the security assurances of 5G technology. It renders users’ security and privacy fully exposed.”
Syed Rafiul Hussain, an Assistant professor at Penn State, highlighted the importance of these findings in a social media post. “This two-scale and automation-friendly assessment uncovered 22 vulnerabilities. Of these 22, 13 are exploitable across 17 5G basebands.”
In the study, the researchers support the necessity of enhancing the protective characteristics of 5D technologies against possible cyber threats.