Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»5G Technology»Attacks on 5G infrastructure from user devices
5G Technology

Attacks on 5G infrastructure from user devices

5gantennas.orgBy 5gantennas.orgSeptember 20, 2023No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


As intended, the base station tunnels this packet within the GTP-U tunnel and sends it to the UPF. This causes the GTP-U in the GTP-U packet to arrive at the UPF. UPF has two of his GTP-U packets. The outer GTP-U packet header is created by the base station to encapsulate data packets from the user device. This outer GTP-U packet contains 0xFF Message type is 44 and length is 44. This header is normal. The internal GTP-U header is created by the user device and sent as a data packet.The inner GTP-U as well as the outer GTP-U. 0xFF Although specified as a message type, it is not normal for the length to be 0.

The source IP address of the inner packet belongs to the user device, and the source IP address of the outer packet belongs to the base station. Both the inner and outer packets have the same destination IP address (UPF destination IP address).

UPF decapsulates the outer GTP-U and passes the functionality check. The destination of the inner GTP-U packet is also the same UPF. What happens next depends on the implementation.

  • Some implementations maintain a state machine for packet traversal. Improper implementation of the state machine could result in processing of this internal GTP-U packet. This packet may have already passed the check phase because it shares the same packet context as the outer packet. This results in the presence of abnormal packets in the system that pass the sanity check.
  • The packet may be sent to the UPF because the destination of the inner packet is the UPF’s own IP address. In this case, the packet is more likely to hit the feature check, so it’s less of a problem than the previous case.

attack vector

Some 5G core vendors are leveraging Open5GS code. For example, NextEPC (a 4G system, rebranded to Open5GS in 2019 to add 5G; the remaining products are from the old brand) has an enterprise offer for LTE/5G powered by Open5GS code. there is. Although no indications of an actual attack or threat have been observed, our testing uses the identified scenarios to illustrate potential risks.

The importance of the attack lies in the attack vector, i.e. the cellular infrastructure attack from the UE. This exploit requires only a mobile phone (or computer connected via a cellular dongle) and a few lines of Python code to exploit this opening to launch this type of attack. GTP-U in GTP-U attacks is a well-known technique, and backhaul IP security and encryption cannot prevent this attack. In fact, these security measures can prevent firewalls from inspecting your content.

Repair and insight

Critical industries such as healthcare and utilities are just some of the early adopters of private 5G systems, and the breadth and depth of adoption is expected to continue to grow. Continuous, uninterrupted operational reliability is critical in these industries, as human lives and real-world impacts are at stake. The basic functionality in these areas is why you choose to use a private 5G system over Wi-Fi. It is essential that private 5G systems provide reliable connectivity, as a successful attack on the 5G infrastructure can bring down the entire network.

This entry allows exploitation of CVE-2021-45462 to potentially lead to a DoS attack. The root cause of CVE-2021-45462 (and most of his GTP-U-in-GTP-U attacks) is improper error checking and error handling in the packet core. Although GTP-U-in-GTP-U itself is harmless, appropriate fixes for gaps must come from the packet core vendor, and infrastructure administrators must use the latest version of the software.

GTP-U-in-GTP-U attacks can also be used to leak sensitive information such as the IP addresses of infrastructure nodes. Therefore, GTP-U peers must be prepared to process GTP-U-in-GTP-U packets. CT environments must use an intrusion prevention system (IPS) or firewall that can understand the CT protocol. Especially in private 5G, security teams can prioritize and drop his GTP-U-in-GTP-U traffic since GTP-U is not normal user traffic.

As a general rule, SIM card registration and use must be strictly regulated and controlled. An attacker with her stolen SIM card could insert it into the attacker’s device, connect it to the network, and perform malicious deployments. Additionally, shared operating models, such as end devices or the edge of a company-owned infrastructure chain, can blur security responsibilities. Mobile phone infrastructure, on the other hand, is owned by integrators or carriers. This makes it difficult for security operations centers (SOCs) to bring together relevant information from different domains and solutions.

Additionally, due to the downtime and testing required, regularly updating critical infrastructure software to accommodate vendor patches is not and will not be easy. Therefore, virtual patching using IPS or layered firewalls is highly recommended. Fortunately, GTP-in-GTP is rarely used in real-world applications, so it may be safe to completely block all GTP-in-GTP traffic. We recommend using a multi-layered security solution that combines IT and communications technology (CT) security and visibility. Implementing a Zero Trust solution such as Trend Micro™ Mobile Network Security powered by CTOne adds another layer of security to enterprises and critical industries, ensuring each private network is secure for a continuous and uninterrupted industrial ecosystem. Unauthorized use can be prevented. SIMs are only used from authorized devices. Mobile Network Security brings CT and IT security into unified visibility and management console.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearch reveals that the development of 5G has significantly improved the health of elderly people
Next Article 5G vs. WiFi 6: How to make an informed wireless network choice | Data Center Knowledge
5gantennas.org
  • Website

Related Posts

Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

August 28, 2024

URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

August 23, 2024

Smart Launches Smart ZTE Blade A75 5G » YugaTech

August 22, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.