Flaws in 4G and 5G could allow attackers to launch DoS attacks and track location

Researchers present their findings just as manufacturers gear up to launch wave of 5G-ready handsets

Businessman making a phone call via a 5G network

Academics have discovered three new vulnerabilities in 4G and 5G networks that could allow malicious actors to track a user's location as well as intercept phone calls.

A new set of attacks, outlined in a paper named 'Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information', exploits the paging protocol, a mechanism which notifies a phone about an incoming call or text message.

Starting and cancelling several calls within a short period of time could trigger a paging message, without notifying a device about an incoming call, which could allow an attacker to track somebody's location.

An attacker would also be able to hijack the paging occasion fixed by the design of 4G and 5G protocols, the time period where the handset polls for services, and pair this with identifiers, such as their phone number. This attack, dubbed Torpedo, could then allow an attacker to send spoof messages or block messages altogether.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Moreover, Torpedo allows malicious attackers to spring two further attacks on their victims, named Piercer and the ISMSI-Cracking attack. The former would allow an attacker to find a user's unique international mobile subscriber identity (IMSI) on the 4G network. The latter, meanwhile, could brute force the encrypted IMSI number for both 4G and 5G numbers.

"The cellular paging (broadcast) protocol strives to balance between a cellular device's energy consumption and quality-of-service by allowing the device to only periodically poll for pending services in its idle, low-power state," the researchers explained.

"For a given cellular device and serving network, the exact time periods when the device polls for services (called the paging occasion) are fixed by design in the 4G/5G cellular protocol.

"Our paper sheds light on an inherent design weakness of the 4G/5G cellular paging protocol which can be exploited by an attacker to not only obtain the victim's paging occasion but also to identify the victim's presence in a particular cell area just from the victim's soft-identity."

The weaknesses were discovered to reside with the networks of all four major telecoms suppliers in the US, and a spattering of firms in Europe and Asian countries, including three from Germany, four providers from Austria, and one in Iceland.

The findings are the latest in a series of security concerns with 5G networks that researchers have demonstrated, well in advance of 5G becoming rolled out on a mainstream basis. Another critical vulnerability in the upcoming 3G, 4G,  and 5G network protocols, outlined by academics at the start of the month, could enable the eavesdropping of calls.

Advertisement - Article continues below

The latest research into 5G network security also emerges as a host of manufacturers debut a fleet of 5G-ready devices at this year's Mobile World Congress (MWC). These include Huawei's 5G-ready 'foldable', dubbed the Mate X, as well as the Samsung Galaxy S105G.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/network-internet/web-browser/354614/microsoft-developer-declares-its-time-to-ditch-ie-for-edge
web browser

Microsoft developer declares it's time to ditch IE for Edge

23 Jan 2020