New Vulnerabilities in 5G Security: Exploring the Sni5Gect Framework
Introduction to the Threat
A recent study from the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD) has unveiled a critical vulnerability in 5G networks. This research introduces a novel attack method that enables hackers to downgrade a 5G connection to older generations without needing to deploy a rogue base station, a maneuver that significantly enhances the attack’s feasibility.
The Sni5Gect Toolkit
At the heart of this vulnerability is a new open-source software toolkit named Sni5Gect, short for "Sniffing 5G Inject." This powerful tool is designed to intercept unencrypted messages exchanged between the base station and user equipment, such as smartphones. By sniffing these communications and injecting malicious messages over the air, attackers can exploit various vulnerabilities in mobile networks.
Attack Capabilities
The Sni5Gect framework enables several forms of attacks. Researchers have noted that it can:
- Crash the user equipment (UE) modem.
- Downgrade the device’s network connection from 5G to 4G.
- Bypass authentication processes.
- Perform device fingerprinting.
According to the researchers—Shijie Luo, Matheus Garbelini, Sudipta Chattopadhyay, and Jianying Zhou—the advantage of Sni5Gect lies in its ability to silently monitor communication without the presence of a rogue base station, which has been a limitation in many 5G attack models.
How the Attack Works
The process operates by passively observing messages during the initial connection stages. Before authentication, messages exchanged between the gNB (next-generation NodeB) and UE are unencrypted, allowing attackers to sniff this data without needing access to the UE’s credentials.
The researchers described this methodology as groundbreaking, asserting, “To the best of our knowledge, SNI5GECT is the first framework that empowers researchers with both over-the-air sniffing and stateful injection capabilities, without requiring a rogue gNB.”
Exploiting Vulnerabilities
Attackers could take advantage of the brief communication window that exists from the Random Access Channel (RACH) process until the Non-Access Stratum (NAS) security context is established. By actively listening for specific messages, attackers can obtain the Radio Network Temporary Identifier (RNTI), which allows further decoding of UE messages.
This opens avenues for attackers to crash the modem on targeted devices, fingerprint identities, or revert network connections to 4G— a weaker protocol with numerous known vulnerabilities.
Practical Testing and Results
In testing conducted on various smartphones, including models like the OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Pro, the researchers reported impressive results. They achieved an 80% accuracy rate in sniffing both uplink and downlink communications. Furthermore, the success rate for injecting messages ranged from 70% to 90% from distances up to 20 meters (approximately 65 feet).
Industry Response and Implications
This multi-stage downgrade attack has been recognized by the Global System for Mobile Communications Association (GSMA), which represents mobile network operators worldwide. The GSMA has assigned an identifier, CVD-2024-0096, to this vulnerability, underscoring its significance in the realm of mobile security.
Future of 5G Security
The authors of the study believe Sni5Gect could be a pivotal tool in 5G security research. They argue that it facilitates over-the-air exploitation while enabling advancements in packet-level intrusion detection and mitigation strategies. This could lead to enhanced security measures for the physical layer of 5G networks and beyond.
Final Thoughts
As the transition to 5G continues to advance, understanding and addressing vulnerabilities like those uncovered by the Sni5Gect framework is crucial for ensuring robust mobile security. Researchers and industry professionals must collaborate to develop effective defenses against such threats, ultimately enhancing the integrity and reliability of 5G networks for users worldwide.


