May 26, 2024


Passion For Business

The GTP Protocol Is Creating Serious Vulnerabilities in Mobile Networks

FavoriteLoadingAdd to favorites

“Currently, operators are placing very number of security actions in location to guard versus these vulnerabilities”

Mobile operators continue to be extremely uncovered to vulnerabilities in the GTP protocol, rendering virtually each and every network open up to denial of service attacks, impersonations and fraud campaigns.

The GTP protocol is a tunneling protocol outlined by the 3GPP criteria to carry Common Packet Radio Service (GPRS) within 3G/4G networks security problems with it are commonly recognised.

Stability business Good Systems explained its tests for 28 telecom operators in Europe, Asia, Africa, and South The united states discovered that each and every 1 was vulnerable, with the attacks in some sites able to be carried out just with a cell cell phone GTP problems also immediately effects 5G networks.

A person of the principal flaws in the GTP protocol is that it does not verify a user’s site, an attacker can use this flaw to ship malicious targeted traffic which the home network has trouble figuring out the legitimacy of subscriber qualifications are also checked on S-GW (SGSN) devices by default, which can be mimicked by an attacker to steal facts, the security business explained in a new report.

The report states that: “The difficulty is that site tracking ought to be cross-protocol, which implies checking the subscriber’s actions by using SS7 or Diameter. The security tools utilized on most networks do not have this kind of capabilities.”

The scientists tested the networks by simulating actual-entire world attacks by sending request to an operator’s network. Employing tools this kind of as a PT Telecom Vulnerability Scanner and a PT Telecom Attack Discovery they discovered that DoS attacks ended up effective 83 per cent of the time.

Dmitry Kurbatov, CTO at Good Systems commented that: “Every network tested was discovered to be vulnerable to DoS, impersonation and fraud. In follow, this implies that attackers could interfere with network devices and leave an complete metropolis with no communications, defraud operators and clients, impersonate buyers to accessibility numerous sources, and make operators pay for non-existent roaming expert services. Moreover, the danger stage is very superior: some of these attacks can be carried out using just a cell cell phone.”

GTP Protocol and 5G

Unfortunately 5G networks are deployed on the Progressed Packet Core (EPC) which was also utilized to build the 4G Prolonged-Time period Evolution network, as this kind of 5G is also vulnerable to exact flaws opened up by the GTP protocol.

The use of the EPC network is supposed to be only a non permanent evaluate until 5G’s core standalone networks is proven, but right until that is in location 5G is vulnerable to the exact security pitfalls as all the other networks.

Dmitry Kurbatov states that: “We can say that most of today’s 5G networks, just like 4G types, are vulnerable to these varieties of attacks. This makes the security vulnerabilities of the GTP protocol urgent – as the improved use of 5G vastly boosts the injury an attack this kind of as a denial of service attack could do.”

“Currently, operators are placing very number of security actions in location to guard versus these vulnerabilities and are also earning configuration mistakes that are placing their networks at even further danger.

“We urge operators to browse this investigation and pay additional awareness to the GTP protocol and comply with the suggestions of the GSMA FS.twenty GPRS Tunnelling Protocol (GTP) Stability, together with implementing ongoing monitoring and investigation of signalling targeted traffic to detect likely security threats.”

See Also: Gaining the Added benefits of System as a Service, Without the need of Inheriting the Threats