
Researchers from Pennsylvania State University have uncovered significant security vulnerabilities in the baseband processors of 5G mobile devices. Basebands are crucial components that handle a phone’s connection to cellular networks. These flaws, affecting chips manufactured by Samsung, MediaTek, and Qualcomm, could potentially allow malicious actors to compromise user privacy and security. The researchers presented their findings at the Black Hat cybersecurity conference in Las Vegas, simultaneously releasing a tool called 5GBaseChecker on GitHub to aid further research in this critical area.
The research team, comprised of Kai Tu, Yilu Dong, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain, demonstrated how these vulnerabilities could be exploited. By creating a fake base station (a simulated cell tower), they were able to trick targeted phones into connecting to it. This deceptive connection provided a pathway for various attacks, including the silent infiltration of devices. According to the researchers, the most severe exploit could lead to a complete takeover of a user’s phone, granting hackers access to sensitive data and device functionality.
One particularly concerning attack vector involves the use of phishing messages. Hackers could leverage the vulnerabilities to send deceptive messages that appear to originate from trusted contacts, tricking users into revealing personal information or visiting malicious websites. Furthermore, the researchers discovered that it was possible to force phones to downgrade their connection from 5G to older, less secure technologies like 4G or even 3G. This downgrade would make it significantly easier for hackers to intercept calls and text messages, further compromising user privacy.
The researchers responsibly disclosed their findings to the affected vendors before going public. The good news is that most of these vulnerabilities have already been patched. Samsung and Google have confirmed that they have released updates to address the identified flaws in their respective devices. However, MediaTek and Qualcomm, two other major baseband manufacturers whose chips were found to be vulnerable, have not yet issued any public statements regarding the matter.
The release of 5GBaseChecker on GitHub is a significant step towards improving the security of 5G networks. By making their tool available to the wider research community, the Penn State team hopes to facilitate the discovery and patching of similar vulnerabilities in the future. This proactive approach is essential for ensuring the continued security and privacy of users as 5G technology becomes increasingly prevalent.