AdaptiveMobile Security Details Major Security Flaw in 5G Core Network Slicing Design
Security vendor details 5G vulnerabilities and is working with industry to provide mitigation prior to widespread deployments.
March 24, 2021
PRESS RELEASE
Dublin, Ireland March 24th 2021 – AdaptiveMobile Security, the world leader in mobile network security, today publicly disclosed details of a major security flaw in the architecture of 5G Network Slicing and virtualized network functions. The fundamental vulnerability has the potential to allow data access and denial of service attacks between different network slices on a mobile operator’s 5G Network, leaving enterprise customers exposed to malicious cyberattack. The issue has the potential to cause significant security risks to enterprises using network slicing and undermine operators’ attempts to open up new 5G revenues. The probability of attack is only currently low due to the limited number of mobile operators with multiple live network slices on their networks. AdaptiveMobile Security is working in conjunction with the GSMA, operators and standards bodies to address the issue and update architectures to prevent exploitation. The full whitepaper detailing the issue is available for download from https://info.adaptivemobile.com/5g-network-slicing-security.
Network slicing allows a mobile operator to divide their core and radio network into multiple distinct virtual blocks that provide different amounts of resources and prioritisation to different types of traffic. One of the most innovative aspects of 5G, network slicing will let operators provide portions of their core networks for specific vertical customer use cases such as automotive, healthcare, critical infrastructure and entertainment. As a result the network is opened up to many partners and sliced into use cases and vertical specific blocks.
In its research, AdaptiveMobile Security examined 5G core networks that contain both shared and dedicated network functions, revealing that when a network has these ‘hybrid’ network functions that support several slices there is a lack of mapping between the application and transport layers identities. This flaw in the industry standards has the impact of creating an opportunity for an attacker to access data and launch denial of service attacks across multiple slices if they have access to the 5G Service Based Architecture. For example, a hacker comprising an edge network function connected to the operator’s service based architecture could exploit this flaw in the design of network slicing standards to have access to both the operator’s core network and the network slices for other enterprises. The impact being that the operator and their customers are exposed and risk the loss of sensitive location data – which would allow user location tracking, the loss of charging related information and even the potential interruption to the operation of the slices and network functions themselves.
“5G is driving the mobile industry into adopting the technology and techniques of the IT world to increase efficiency and improve functionality. However, while laudable, there needs to be a wider mindset change. When it comes to securing 5G, the telecoms industry needs to embrace a holistic and collaborative approach to secure networks across standards bodies, working groups, operators and vendors,” said Dr. Silke Holtmanns, Head of 5G Security Research at AdaptiveMobile Security.
The outcome of the research has been shared with the GSMA in line with the standard co-ordinated vulnerability disclosure process. AdaptiveMobile Security is investigating if the currently defined 5G standards’ mechanisms will be sufficient to stop an attacker and in doing so, uncovered three main attack scenarios based on the flaw which cannot be mitigated according to today’s specified technology:
- User data extraction – in particular location tracking
- Denial of service against another network function
- Access to a network function and related information of another vertical customer
“As more of the core network moves to the cloud and an IT-based architecture, so more suitable hacking tools become available for hackers,” Holtmanns continued. “Currently, the impact on real-world applications of this network slicing attack is only limited by the number of slices live in 5G networks globally. The risks, if this fundamental flaw in the design of 5G standards had gone undiscovered, are significant. Having brought this to the industry’s attention through the appropriate forums and processes, we are glad to be working with the mobile network operators and standards communities to highlight these vulnerabilities and promote best practice going forward.”
Full details of the research are published in the whitepaper, A Slice in Time: Slicing Security in 5G Core Networks, which is available for download from https://info.adaptivemobile.com/5g-network-slicing-security
About AdaptiveMobile Security
AdaptiveMobile Security is the world leader in mobile network security, protecting more than 2.1 billion subscribers worldwide. With deep expertise and a unique focus on network-to-handset security, AdaptiveMobile’s award-winning security solutions and services provide its customers with advanced threat detection and actionable intelligence, combined with the most comprehensive security product-set in the market today.
AdaptiveMobile Security was founded in 2006 and counts some of the world’s largest carriers, Governments and Regulators as customers. The Company is headquartered in Dublin with offices in North America, Europe, South Africa, the Middle East and Asia Pacific.
Protecting Every Nation! Every Network! Every Number!
Richard Howson
Temono
Direct: +44 (0)7833 693 862
You May Also Like