Vulnerabilities

Researchers Find 36 security vulnerabilities in LTE standard

Each new research conducted by experts from the best ethical hacking Institute and specialists from the International Institute of Cyber Security (IICS) shows new security flaws in communication standards such as LTE, used for high-speed data transmission.

On this occasion, the investigation has thrown 36 new vulnerabilities in LTE that, if exploited, would allow a wide range of variable severity attacks, such as disconnecting a user from the cellular network by listening to data, for example. Experts from the best ethical hacking Institute discovered multiple exploits using a specialized fuzzing tool (a software test technique that involves sending large amounts of random data to look for anomalous behavior).

The researchers added that the problem is
rarely consistent. An operator can have different vulnerabilities on two
network computers, while a network computer may have drawbacks to two different
vendors.

According to the experts from the best ethical
hacking institute, the findings of the investigation will be presented next May
during a cybersecurity
congress, in addition, the researchers put the tools that they used within the
reach of the manufacturers of devices of LTE technology to perform better
vulnerability analyses and develop the necessary fixes.

It should be noted that the vulnerabilities
discovered by this team of researchers are not necessarily exploitable in the
wild. However, researchers point out that this kind of research is necessary to
remember that this kind of technology is not invulnerable to the actions of the
threat actors.

Long Term Evolution (LTE) is a mobile
communications standard developed by the 3rd
Generation Partnership Project
(3GPP), the association that developed
and is responsible for the maintenance of GSM and UMTS technology.

LTE Technology was born thinking of covering
mainly needs such as the high-speed data connection required by users and the
lack of an uncomplicated standard and that helps to reduce costs for the
companies manufacturers and telecommunications operators.

To Top

Pin It on Pinterest

Share This