Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:15 PM
Connect Directly

5G Standard to Get New Security Specifications

Researchers had recently demonstrated how attackers could intercept device capability information and use it against 5G mobile subscribers.

The standards body in charge of 5G wireless network security is drafting new requirements for addressing recently reported vulnerabilities in the technology that impact both end user devices and operator infrastructure.

The new requirements - which are expected to become available from the 3rd Generation Partnership Project (3GPP) with the next release of the 5G standard - specify how certain device information should be handled on the network. 

Security researchers at the Technical University of Berlin and Kaitiaki Labs discovered the vulnerabilities earlier this year and presented details of their work at Black Hat USA.

The problem, according to the researchers, is that when a mobile device registers on a 5G network, details about the device and its technical capabilities are exchanged in an insecure manner. This gives attackers a way to intercept the device capability data and use it to identify specific devices, degrade performance, and drain batteries.

"The vulnerabilities are present in the 4G and 5G registration procedure that happens every time a device is turned on with SIM card," says Altaf Shaik, principal security researcher at Kaitiaki Labs and PhD student at the Technical University of Berlin.

During this procedure the device conveys its capabilities — such as its throughput categories, app data, radio protocol support, security algorithms, and carrier info — to the network, either in plain text or prior to establishing over-the-air security. This opens the procedure to both passive attacks and man-in-the-middle attacks, Shaik says.  

"Attackers can obtain the capabilities and fingerprint specific devices or can modify the capabilities and cause downgrade or DoS [denial-of-service] attacks," he says.

Potential dangers include attackers being able to track high-value devices such as those belonging to politicians or the military, or downgrading devices to less secure networks and causing poor quality of service overall.

4G LTE Affected as Well

Shaik identified the vulnerabilities in the current 3rd Generation Partnership Project (3GPP) standards for mobile telephony. All devices supporting 4G LTE and upcoming 5G standards are impacted.

Shaik and fellow researcher Ravishankar Borgaonkar from Kaitiaki Labs built an experimental setup consisting of two i7 PCs running Linux and two software-defined radio modules to demonstrate how attackers could exploit the vulnerabilities.

Shaik says the task of fingerprinting mobile devices using the vulnerabilities is similar to using the Nmap network-scanning tool on the Internet. By intercepting and analyzing device capabilities, an attacker can identify device model, device type, manufacturer, applications, operating system version, and other details.

The two researchers used their experimental set up to similarly show how an attacker could use a man-in-the-middle attack to make a device appear less powerful than it really is to the network - thereby effectively neutralizing its high-speed capabilities. In experiments the researchers conducted with an iPhone 8 and a Nighthawk M1 mobile router, the researchers were able to degrade device performance from 27 Mbps to 3 Mbps. Of the 30 mobile networks that Shaik and Borgaonkar tested for the issue, 21 were impacted.

Similarly, attackers can cut down the effective battery life of narrowband IoT devices by a factor of five by disabling the IoT functionality in the devices and making them operate like a traditional smartphone, Shaik says.

The 3GPP standards body is currently working on introducing a requirement that device capability information is protected and will be sent to the network only after a secure session has been established, he adds.

High Impact on Unattended IoT

In a change request form on the 3GPP website, the organization described the vulnerabilities as exposing user equipment to attacks that can downgrade device throughput, or to trace specific devices.

"Since the [User Equipment] capabilities are persistently stored in the network, the impact of the attack can last for weeks, or until the UE is power cycled," the standards body said. It added that such attacks could have a particularly high impact on unattended IoT devices.

Rolando Hernandez, vice president at Valid, a Brazilian provider of various mobile technology and data services, says the security issues surrounding 5G exist at both the network and the device level. "Protection of the subscriber’s identity is one of 5G’s biggest security challenges," he notes.

"The easiest fix to this challenge is to implement the subscription concealed identifier (SUCI), which adds an additional layer of security," he says. The SUCI prevents a malicious actor from tracking mobile subscribers because the subscriber identifier in a 5G SIM card is encrypted such that only the 5G network is able to match the real subscriber, he says.

"The standards bodies are a carrier's best bet for mitigating the vulnerabilities associated with 5G networks," he notes. "When any vulnerability is discovered and improvements are suggested, standardization entities launch a new version of the standards, indicating the changes that manufacturers will need to implement in their equipment or devices."

Related Content:


Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "'It Takes Restraint': A Seasoned CISO's Sage Advice for New CISOs."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-11
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
PUBLISHED: 2020-08-11
Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.
PUBLISHED: 2020-08-11
An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth'...
PUBLISHED: 2020-08-11
HUAWEI Mate 20 versions Versions earlier than;HUAWEI Mate 20 Pro versions Versions earlier than,Versions earlier than,Versions earlier than;HUAWEI Mate 20 X versions Versions earlier than
PUBLISHED: 2020-08-11
In PACTware before 4.1 SP6 and 5.x before, passwords are stored in a recoverable format, and may be retrieved by any user with access to the PACTware workstation.