Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»5G Technology»Learn more about packet reflection vulnerabilities that allow attackers to compromise private 5G networks
5G Technology

Learn more about packet reflection vulnerabilities that allow attackers to compromise private 5G networks

5gantennas.orgBy 5gantennas.orgJuly 11, 2023No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


From the outside: How packet reflection vulnerabilities allow attackers to penetrate internal 5G networks Download Outside Looking In: How Packet Reflection Vulnerabilities Allow Attackers to Infiltrate Internal 5G Networks

Written by Salim SI

5G technology is contributing to the digital transformation of the industrial sector in the Internet of Things (IoT) era, with modern factories now able to connect multiple devices simultaneously through their own 5G networks. However, despite the productivity and market opportunities that 5G networks offer, they are not immune to cyber-attacks.

Recent collaborative research efforts with CTOne include: Telecom Technology Center (TTC), Official Advisory Group of the Taiwan National Telecommunications Commission and the Ministry of DigitalLet’s investigate ZDI-CAN-18522, a packet reflection vulnerability in the UPF of 5G core (5GC). Since there is no authentication mechanism in the GTP-U protocol between the base station and the user plane of 5GC; ZDI-CAN-18522 It penetrates within the 5GC UPF and compromises 5G devices connected to the internal network.

ZDI-CAN-18522, Scored 8.3 on the Common Vulnerability Scoring System (CVSS); This allows cybercriminals from external networks to exploit GTP-U and attack connected 5G devices. After testing attack scenarios against his 5GC for two commercial and two open source vendors, we found that all vendors are at risk for these potential attacks as a result of this vulnerability. Ta.

A private enterprise’s 5G network deployment may have a variety of topologies. In certain topologies, the UPF interface remains exposed to the Internet and thus within reach of threat actors on external networks. ZDI-CAN-18522 allows cybercriminals to access 5G IoT devices through exposed 5GC interfaces, even if they are protected by a firewall, network address translation (NAT), or in an isolated environment. There is likely to be.

Expansion of attack target area

In a 5G network, every user device has at least one GTP tunnel to send and receive data traffic transferred between the 5GC on the cloud and the base station over these tunnels. The 5GC user plane identifies her GTP tunnels by the 32-bit Tunnel Endpoint Identifier (TEID), which forms part of the GTP header. 5G user devices also have separate TEIDs for uplink and downlink.

Through tunneling, the contents of GTP packets, which are created by adding a GTP header to the original packet, can be sent across subnets without modification. As long as the TEID is valid, GTP packets can be sent to 5G user devices from anywhere. A cybercriminal could send multiple pings to the target IP with different his TEIDs in GTP packets, of which he could rely on a smart guess to match one. TEID and IP.

lack of encryption GTP-U protocolIn effect, 5G is here.C The interface itself is a possibility point of entry for threat actors, GTP-U tunneling is an enterprise private Subnet accessed from external network(Figure 1). This security flaw is further exacerbated by the fact that many 5GC vendors do not have built-in mechanisms that allow UPF to verify that packets come from a trusted source. This is because it is not a required feature under the three regulations.rd Generation Partnership Project (3GPP) standard.

Learn more about packet reflection vulnerabilities that allow attackers to compromise private 5G networks

Figure 1. An attacker from an external network can access the private network through the factory network.

Potential attack vectors

During the course of this research, we identified the following attack vectors that attackers could use to compromise 5G networks via this vulnerability:

downlink

We discovered that in one attack scenario, attack packets (with the user device’s IP set as the destination and the Internet IP set as the source) could be encapsulated in a GTP packet and sent to UPF. (see arrow 1 in the figure). Figure 2). After retrieving the TEID, the UPF decapsulates the packet and sends it to the user device (arrows 2 and 3). The user device then responds to the Internet IP (arrows 4, 5, and 6). If the attacker has set the Internet IP to their own, this could allow them to establish a two-way connection with the device (Figure 3).

Figure 2. Cyber ​​attack in which an attacker establishes a downlink connection with a 5G user device.

Figure 2. Cyber ​​attack in which an attacker establishes a downlink connection with a 5G user device.

Figure 3. Attacker establishes a two-way connection with a 5G user device

Figure 3. Attacker establishes a two-way connection with a 5G user device

uplink

Another type of attack involves an attacker creating a packet encapsulated in a GTP packet with the user device’s IP as the source and the Internet IP as the destination. This is sent to UPF (see arrow 1 in Figure 4), which looks up her TEID, decapsulates the inner packet, and forwards it to the Internet IP (arrow 2). The Internet server responds to the user device and sends the packet over the 5G network (arrows 3, 4, and 5).

Figure 4. Cyberattack where an attacker establishes an uplink connection on behalf of a 5G user device

Figure 4. Cyberattack where an attacker establishes an uplink connection on behalf of a 5G user device

5G security risk mitigation

As manufacturing sites become more connected, the points of entry for attackers also become more complex. Defending against new threats to networked factories requires a proactive and comprehensive security strategy. Use the following defense strategies to strengthen your defenses against security flaws like ZDI-CAN-18522.

  • As suggested by the GSM Association (GSMA), enterprises can use Internet Protocol Security (IPsec) to secure GTP. This, or any other similar secure tunneling mechanism between the base station and his 5GC, helps thwart man-on-the-side (MoTS) attacks.
  • Businesses can also reduce their attack surface by using external security devices that are capable of IP cross-checking. This is because many commercial 5GC vendors do not offer it.

Multi-layered security solutions, such as Trend Vision One™, a cybersecurity platform, can help protect your company’s infrastructure. Trend Vision One provides enterprises with a complete view of the attack surface and streamlined detection and response adapted for ICS and 5G. Assessing exposure to risks and automatically deploying controls to mitigate those risks generates lower-fidelity alerts and frees security teams to tackle strategically important tasks. I will make it possible.

As more companies adopt private 5G networks with low latency, high bandwidth, and high density capabilities, they need to protect their factory environments from potential cyberattacks. To this end, Trend Micro ICS/OT Security offers solutions built on the thorough threat intelligence and expertise of Zero Day Initiative, TXOne Networks, and Trend Micro Research. A suite of integrated IT, OT, and CT solutions enables early threat detection and response while reducing monitoring complexity, enabling manufacturers to better defend their industrial IT ecosystems.

About CTOne

CTOne, a global leader in cybersecurity in communications technology, provides enterprise cybersecurity solutions for next-generation wireless networks. His CTOne, a subsidiary of Trend Micro, enables digital transformation and strengthens the resilience of communications technology.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article[Latest] Global Private 5G Network Market Size/Share Worth
Next Article 5G IoT roaming connections are about to explode
5gantennas.org
  • Website

Related Posts

Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

August 28, 2024

URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

August 23, 2024

Smart Launches Smart ZTE Blade A75 5G » YugaTech

August 22, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.