The GTP Protocol Is Creating Serious Vulnerabilities in Mobile Networks

FavoriteLoadingInsert to favorites

“Currently, operators are putting quite couple stability steps in put to protect towards these vulnerabilities”

Mobile operators remain hugely exposed to vulnerabilities in the GTP protocol, rendering practically each community open up to denial of assistance assaults, impersonations and fraud campaigns.

The GTP protocol is a tunneling protocol described by the 3GPP requirements to carry General Packet Radio Provider (GPRS) within just 3G/4G networks stability difficulties with it are commonly recognised.

Stability business Positive Technologies claimed its assessments for 28 telecom operators in Europe, Asia, Africa, and South The usa observed that each just one was susceptible, with the assaults in some destinations able to be carried out just with a cellular mobile phone GTP difficulties also right influence 5G networks.

A person of the key flaws in the GTP protocol is that it does not check out a user’s area, an attacker can use this flaw to send out malicious targeted traffic which the dwelling community has problems identifying the legitimacy of subscriber qualifications are also checked on S-GW (SGSN) products by default, which can be mimicked by an attacker to steal knowledge, the stability business claimed in a new report.

The report states that: “The challenge is that area tracking ought to be cross-protocol, which suggests checking the subscriber’s movements by utilizing SS7 or Diameter. The stability resources applied on most networks really do not have this kind of abilities.”

The researchers examined the networks by simulating real-planet assaults by sending ask for to an operator’s community. Employing resources this kind of as a PT Telecom Vulnerability Scanner and a PT Telecom Assault Discovery they observed that DoS assaults had been profitable 83 per cent of the time.

Dmitry Kurbatov, CTO at Positive Technologies commented that: “Every community examined was observed to be susceptible to DoS, impersonation and fraud. In observe, this suggests that attackers could interfere with community products and depart an complete metropolis without the need of communications, defraud operators and customers, impersonate people to entry various sources, and make operators pay for non-existent roaming services. In addition, the hazard amount is quite substantial: some of these assaults can be done utilizing just a cellular mobile phone.”

GTP Protocol and 5G

Regrettably 5G networks are deployed on the Developed Packet Core (EPC) which was also applied to build the 4G Lengthy-Phrase Evolution community, as this kind of 5G is also susceptible to identical flaws opened up by the GTP protocol.

The use of the EPC community is intended to be only a momentary measure until 5G’s core standalone networks is established, but until that is in put 5G is susceptible to the identical stability dangers as all the other networks.

Dmitry Kurbatov states that: “We can say that most of today’s 5G networks, just like 4G kinds, are susceptible to these varieties of assaults. This will make the stability vulnerabilities of the GTP protocol urgent – as the enhanced use of 5G vastly boosts the problems an attack this kind of as a denial of assistance attack could do.”

“Currently, operators are putting quite couple stability steps in put to protect towards these vulnerabilities and are also making configuration errors that are putting their networks at even further hazard.

“We urge operators to study this exploration and pay much more awareness to the GTP protocol and observe the recommendations of the GSMA FS.twenty GPRS Tunnelling Protocol (GTP) Stability, such as employing ongoing monitoring and analysis of signalling targeted traffic to detect opportunity stability threats.”

See Also: Gaining the Rewards of Gadget as a Provider, With no Inheriting the Pitfalls