New Sni5Gect Attack Downgrades 5G to 4G and Crashes Phones Without a Rogue Base Station

Published:

spot_img

New Vulnerabilities in 5G Security: Exploring the Sni5Gect Framework

Introduction to the Threat

A recent study from the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD) has unveiled a critical vulnerability in 5G networks. This research introduces a novel attack method that enables hackers to downgrade a 5G connection to older generations without needing to deploy a rogue base station, a maneuver that significantly enhances the attack’s feasibility.

The Sni5Gect Toolkit

At the heart of this vulnerability is a new open-source software toolkit named Sni5Gect, short for "Sniffing 5G Inject." This powerful tool is designed to intercept unencrypted messages exchanged between the base station and user equipment, such as smartphones. By sniffing these communications and injecting malicious messages over the air, attackers can exploit various vulnerabilities in mobile networks.

Attack Capabilities

The Sni5Gect framework enables several forms of attacks. Researchers have noted that it can:

  • Crash the user equipment (UE) modem.
  • Downgrade the device’s network connection from 5G to 4G.
  • Bypass authentication processes.
  • Perform device fingerprinting.

According to the researchers—Shijie Luo, Matheus Garbelini, Sudipta Chattopadhyay, and Jianying Zhou—the advantage of Sni5Gect lies in its ability to silently monitor communication without the presence of a rogue base station, which has been a limitation in many 5G attack models.

How the Attack Works

The process operates by passively observing messages during the initial connection stages. Before authentication, messages exchanged between the gNB (next-generation NodeB) and UE are unencrypted, allowing attackers to sniff this data without needing access to the UE’s credentials.

The researchers described this methodology as groundbreaking, asserting, “To the best of our knowledge, SNI5GECT is the first framework that empowers researchers with both over-the-air sniffing and stateful injection capabilities, without requiring a rogue gNB.”

Exploiting Vulnerabilities

Attackers could take advantage of the brief communication window that exists from the Random Access Channel (RACH) process until the Non-Access Stratum (NAS) security context is established. By actively listening for specific messages, attackers can obtain the Radio Network Temporary Identifier (RNTI), which allows further decoding of UE messages.

This opens avenues for attackers to crash the modem on targeted devices, fingerprint identities, or revert network connections to 4G— a weaker protocol with numerous known vulnerabilities.

Practical Testing and Results

In testing conducted on various smartphones, including models like the OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Pro, the researchers reported impressive results. They achieved an 80% accuracy rate in sniffing both uplink and downlink communications. Furthermore, the success rate for injecting messages ranged from 70% to 90% from distances up to 20 meters (approximately 65 feet).

Industry Response and Implications

This multi-stage downgrade attack has been recognized by the Global System for Mobile Communications Association (GSMA), which represents mobile network operators worldwide. The GSMA has assigned an identifier, CVD-2024-0096, to this vulnerability, underscoring its significance in the realm of mobile security.

Future of 5G Security

The authors of the study believe Sni5Gect could be a pivotal tool in 5G security research. They argue that it facilitates over-the-air exploitation while enabling advancements in packet-level intrusion detection and mitigation strategies. This could lead to enhanced security measures for the physical layer of 5G networks and beyond.

Final Thoughts

As the transition to 5G continues to advance, understanding and addressing vulnerabilities like those uncovered by the Sni5Gect framework is crucial for ensuring robust mobile security. Researchers and industry professionals must collaborate to develop effective defenses against such threats, ultimately enhancing the integrity and reliability of 5G networks for users worldwide.

spot_img

Related articles

Recent articles

Integrated Transport Centre Strengthens Partnerships with Strategic Partners in Abu Dhabi

Integrated Transport Centre Strengthens Partnerships with Strategic Partners in Abu Dhabi Abu Dhabi's Integrated Transport Centre (ITC), a key entity under the Department of Municipalities...

NIST Restricts CVE Enrichment Following 263% Surge in Submissions

NIST Restricts CVE Enrichment Following 263% Surge in Submissions The National Institute of Standards and Technology (NIST) has implemented significant changes to its management of...

Al Nada Tower Achieves LEED Gold Certification, Strengthening MREF’s Investment Strategy

Al Nada Tower Achieves LEED Gold Certification, Strengthening MREF's Investment Strategy Kuwait Financial Centre “Markaz” has announced that Al Nada Tower has been awarded LEED...

Tis Hazari Court Convicts CBI Joint Director and Retired ACP for Malicious 2000 Raid on Ashok Aggarwal

Tis Hazari Court Convicts CBI Joint Director and Retired ACP for Malicious 2000 Raid on Ashok Aggarwal In a significant ruling, Delhi's Tis Hazari Court...