Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency Security flaws in existing mobile networks could find their way into 5G networks too, the European Union Agency for Network and Information Security, ENISA, has warned. That’s potentially bad news for the internet of things (IoT), where millions of insecure devices are being connected to mobile networks without adequate thought being given to the authentication and encryption of communications.The danger is that known flaws in SS7 and Diameter, the signaling protocols used in 2G, 3G and 4G mobile could be built into 5G too, allowing traffic to be eavesdropped or spoofed, and location information to be intercepted, ENISA said in a report published Thursday.“There is a certain risk of repeating history” with the move to 5G, it said, adding that the ability of 5G networks to support more users and more bandwidth increases the danger.Attackers can exploit the SS7 signaling protocol used in 2G and 3G networks to intercept or divert text messages sent via SMS. This wouldn’t be so bad if it just meant the attacker knew your friend would “CU L8R” — but many organizations use SMS two-factor authentication, assuming that only a phone’s owner will see a message sent to it. That’s a risky assumption: As ENISA notes, several German banks have seen customers’ accounts drained of funds when mobile one-time passwords sent via SMS were intercepted.Researchers have also demonstrated denial-of-service attacks on 4G networks using the Diameter signaling protocol, allowing them to disconnect a target’s mobile phone from the network temporarily or permanently. Those attacks are likely to be just the start of it. “While work is being done in addressing SS7 and Diameter attacks, only a small portion of the protocols has been studied,” ENISA said. “It is expected that new vulnerabilities shall be discovered.”Even where flaws have been discovered and fixes proposed, little has changed, ENISA complained. “Several proposals to secure SS7 and Diameter have never been adopted by the industry (MAPsec, TCAPsec, Diameter over IPsec, Diameter over SCTP/DTLS).” 5G networks use other protocols in addition to, or instead of, SS7 and Diameter, but that doesn’t put an end to the problem. The use of common internet protocols such as HTTP, TLS, and the REST API in 5G networks means that when vulnerabilities in those protocols are discovered, exploits and penetration testing tools for them will be readily transferrable to mobile networks too.“This implies that the grace period between vulnerability discovery and real exploitation will become much shorter compared to SS7 and Diameter,” ENISA said. Of particular concern to ENISA is that network operators are already talking about rolling out 5G networks, while standards bodies still haven’t nailed down all the security issues.This might ultimately put Europe, where 5G deployment is lagging, ahead of the U.S. and some Asian countries, which are talking of offering commercial 5G service ENISA wants to see laws and regulations changed so that network operators are required to secure their signaling systems — rather than hindered as is the case today. It also suggests government funding could be allocated to improving the security of signaling systems.This isn’t just an EU matter, it warned: poor security in networks elsewhere in the world can provide a way in for attackers to meddle with corresponding networks in Europe — or vice versa. Related content news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Android Security Mobile Security news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe