Silke Holtmanns的动态

查看Silke Holtmanns的档案

Telecommunication Security Expert

Randomness of keys and identifiers in Telco infrastructure is up to the vendors (implementation specific Vs standard). I personally believe this will not be the last "not-really-random" issue we will see.... I wonder how many vendors really updated the randomness of their TEIDs (cvd2022-0056 if I recall correctly) after it was reported to GSMA? Maybe operators should consider writing this explicitly in their RFQs and contract, after all if it is not in the contract or standard why should a vendor spend money on it? For altruism? PS: Just to clarify, even if the implementation is up to the vendor, the operation and lifecycle management for keys is commonly the responsibility of the operator.

查看SBA Research的组织主页

1,477 位关注者

?? ???????????????? ???????????????? ?????????????????????? ?????????????? ???????????????? ???????????????? ?????????????????????????????? ???? ???????????? – ?????????????????? ???????????????? ???????????? ????????????????! Significant global security vulnerabilities and the possibility of eavesdropping in Voice over WiFi (VoWiFi) have been exposed by security researchers from SBA Research, the Universit?t Wien, and the CISPA Helmholtz Center for Information Security in Saarbrücken.?VoWiFi, already supported by all major Austrian mobile operators, was thoroughly evaluated, revealing two independent security vulnerabilities. “??????????????????, ???? ?????????? 13 ???????????? ?????????????????? (?????????????????? ?????? ???????? ??????????????) ?????? ???????? ???? ?????? ?????????????? ?????????????????? ?????????? ?????????? ???????????????????????????? ???????? ?????? ???????? ???????????? ???????? ?????? ??????????, ?????????????????????? ?????? ?????????????????????????? ???????????????? ???? ???????? 140 ?????????????? ??????????????????.” Gabriel Karl Gegenhuber ?????? ????????????????: ?? ??????-????-?????????????? ????????: Some mobile operators used the same private keys for key exchange, affecting over 140 million customers worldwide, including operators from Austria, Brazil, and Russia. Vulnerability affected those operators using ZTE equipment for their core network. ?? ???????????????? ????????????????????: Up to 80% of client and server parameters that are used in real-world commercial VoWiFi deployments are deprecated since 2016, indicating a significant need for security improvements.? ?? ???????????? ?????????????????? ??????????????: Many new MediaTek chipsets allowed downgrades to the weakest key exchange method, even if unsupported by smartphone configuration, making cracking easier. “?????????????????????? ???????????????? ???????????????? ???? ???????????????? ???????????????????????????? ???? ?????????????????? ?????? ?? ???????????? ?????????????? ??????????????.” Adrian Dabrowski ?? ???????? ?????? ?????????? ????????????????: https://lnkd.in/geCkPTz9 The vulnerabilities were responsibly disclosed to @GSMA and relevant manufacturers and providers, leading to updates and improvements. ??????-????????-???????? - GSMA Mobile Security Research Acknowledgements https://lnkd.in/gS7HG-WF ??????-????????-?????????? - MediaTek June 2024 Product Security Bulletin https://lnkd.in/gNaszESz ??????-????????-?????????? - ZTE Configuration Error Vulnerability in ZTE ZXUN-ePDG?https://lnkd.in/gEpr7VAS ??: Niklas Schnaubelt, Laura Jahke / CISPA #Vulnerability #VoWiFi #SecurityResearch #ForschungWirkt #comet2gether

  • 该图片无替代文字
  • 该图片无替代文字
  • 该图片无替代文字

要查看或添加评论,请登录