Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Researchers Uncover Vulnerabilities in LTE Wireless Protocol

Researchers from the Korea Advanced Institute of Science and Technology Constitution (KAIST) say they have discovered 36 previously undisclosed vulnerabilities in the Long Term Evolution (LTE) protocol used by most mobile carriers.

Researchers from the Korea Advanced Institute of Science and Technology Constitution (KAIST) say they have discovered 36 previously undisclosed vulnerabilities in the Long Term Evolution (LTE) protocol used by most mobile carriers.

The flaws were discovered using a semi-automated testing tool named LTEFuzz, which generates and sends test cases to a target network and then classifies problematic behavior by monitoring device-side logs. The results were confirmed against operational LTE networks. 

In a whitepaper (PDF), the researchers explain that their findings were categorized into five types, namely improper handling of unprotected initial procedure, crafted plain requests, messages with invalid integrity protection, replayed messages, and security procedure bypass.

“The impact of the attacks is to either deny LTE services to legitimate users, spoof SMS messages, or eavesdrop/manipulate user data traffic,” the researchers explain. 

Security vulnerabilities have been discovered in the control plane procedures of LTE networks, but the control plane components in LTE remain unexplored, which determined the researchers to investigate potential issues in this area. 

For their testing, the researchers used open-source LTE implementations meant to create concrete security properties and test cases, and also worked with carriers as part of the investigation, to demonstrate the attacks on commercial networks. They eventually uncovered 36 new flaws in design and implementation among the different carriers and device vendors. 

“The purpose of our study was not to identify failures causing crashes or memory leaks. Instead, we focused on finding semantic failures in LTE operations. To this end, we generated all possible test cases that would have been correctly parsed in the receiving entities as the field values are created based on the control plane logs from the operational networks.” the researchers say.  

The testing revealed that the Radio Resource Control (RRC) Connection procedure is neither encrypted nor integrity protected, which could allow an adversary to exploit the messages in this procedure to spoof the contents or deny the connection of the victim device. 

Advertisement. Scroll to continue reading.

An attacker could send invalid plain requests through an RRC Connection spoofed as the victim device, and the network may accept invalid messages, de-register an existing connection when receiving a message with an invalid MAC, and accept replayed messages. Furthermore, it is possible to bypass the security context of the entire control plane and data plan, the researchers say. 

Possible attacks would target either the network (remote de-registration of the victim device, SMS phishing) or the victim device (an adversary located sufficiently close to the victim device could trigger handover to a rogue LTE network), the researchers say. 

The study discovered issues not only in the LTE networks, but also in baseband chipsets from Qualcomm and HiSilicon. Thus, the researchers say they want to privately release LTEFuzz to the impacted carriers and vendors in the near future. A public release isn’t planned, as the tool can be used maliciously. 

Related: Researchers Create Attacks That Compromise LTE Data Communication

Related: Researchers Devise New Attacks Against 4G LTE Mobile Networks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.