Attackers can exploit vulnerabilities in new 5G networks to steal subscriber data and impersonate users

Positive Technologies has published its “5G standalone core security assessment”. The report discusses vulnerabilities and threats for subscribers and mobile network operators, which stem from the use of new standalone 5G network cores. The vulnerabilities in protocols HTTP/2 and PFCP, used by standalone 5G networks, include the theft of subscriber profile data, impersonation attacks and faking subscriber authentication.

Read full article on Security Magazine


Date:

Categorie(s):