5G Network Slicing Vulnerabilities Risk DoS, Location Tracking, Data Theft, and Other Threats

Researchers have found some serious vulnerabilities in 5G network slicing and virtualization technology. Exploiting these vulnerabilities poses risks of data theft, location exposure, and even DoS attacks.

5G Network Slicing Vulnerabilities Found

AdaptiveMobile Security has shared a detailed white paper highlighting the vulnerabilities in 5G network slicing. Specifically, they have discovered three different vulnerabilities that affect the way 5G uses OAuth for network slicing.

Briefly, network slicing technology lets the network (mobile) operators divide the network into separate blocks (or ‘slices’). In this way, the operators can better handle the different types of traffic as per the allocated resources.

. For instance, they can manage the traffic for healthcare, technology, automotive, and other sectors separately.

Nonetheless, the underlying authentication flaws expose the networks to the risk of compromised nodes leaking excessive details than intended.

The risk arises if an adversary manages to compromise a particular slice on a network bearing several slices or hybrid network functions. Once done, the adversary can then

  • access users’ location
  • trigger denial of service (dos) attacks to a network function
  • access information of other verticals

Suggested Countermeasures

Although, these attacks currently hold a low probability score owing to the limited number of operators. Yet, in the future when 5G will become commonplace, these flaws will attract adversaries.

Hence, the researchers have advised some countermeasures to prevent such exploits. These include employing robust authentication to prevent an adversary from impersonating a network slice, validating information across different layers, and deploying signaling layer protection to prevent data leakage.

As they stated,

This kind of filtering and validation approach allows division of the network into security zones and safeguarding of the 5G core network.
Cross-correlation of attack information between those security network functions maximizes the protection against sophisticated attackers and allows better mitigations and faster detection while minimizing false alarms.

Let us know your thoughts in the comments.

Related posts

Water Facilities Must Secure Exposed HMIs – Warns CISA

Microsoft December Patch Tuesday Arrived With 70+ Bug Fixes

NachoVPN Attack Risks Corporate VPN Clients