100+ Security Flaws Uncovered in 5G Networks
Over 100 Security Flaws Uncovered in LTE and 5G Networks
Security Risk in Cellular Networks Exposed by Researchers
A team of cybersecurity researchers has disclosed a staggering 119 vulnerabilities affecting LTE and 5G network implementations, with potential consequences that could disrupt cellular communication at a city-wide scale. The vulnerabilities, spanning multiple open-source LTE and 5G projects, could allow attackers to crash critical network components, hijack communications, and even breach core network security—all without requiring authentication.
Uncovering the Flaws
The findings were presented in a study titled "RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces," conducted by researchers from the University of Florida and North Carolina State University. Their research focused on the vulnerabilities present in the interfaces connecting the Radio Access Network (RAN) and core network—key components in mobile communication infrastructure.
Among the affected implementations are:
Of the 119 flaws, 97 received unique CVE identifiers, emphasizing the severity of the findings. These weaknesses include buffer overflow and memory corruption vulnerabilities, which can be exploited to gain access to cellular core networks and execute malicious activities, including tracking user locations and targeting specific subscribers.
The Attack Potential: Disrupting an Entire City's Communication
According to the study, anyone with a simple mobile device—without a SIM card—could exploit these vulnerabilities to crash a network’s Mobility Management Entity (MME) or Access and Mobility Management Function (AMF). This could shut down phone calls, messaging, and data services across an entire city.
领英推荐
Two Major Categories of Attacks
The researchers categorized the vulnerabilities into two key attack vectors:
The Growing Security Risks of Open RAN and 5G Networks
With 5G deployments expanding, the introduction of easily accessible gNodeB base stations and home-use femtocells has created new security challenges. Unlike legacy cellular infrastructure, which was physically secured and isolated, modern network elements are increasingly exposed to physical and remote threats.
The researchers warn that historically "assumed secure" interfaces are now prime targets for adversaries, making robust security measures essential for next-generation network deployments.
What’s Next?
The disclosure of these vulnerabilities raises urgent questions about the security of current LTE and 5G networks. While network operators and vendors will need to patch these flaws, the sheer scale of the issue suggests systemic security gaps that could take months, if not years, to fully address.
As the industry moves toward more software-driven, open-source telecom solutions, ensuring rigorous security testing and proactive vulnerability management will be critical in preventing large-scale disruptions and cyberattacks on global communication infrastructure.