1250x260_Light
1250x260

5G Network Slicing – A potential vulnerability to Cyberattacks

Date:

Firstly A major security flaw in the 5G network slicing architecture has been identified. The network slicing flaw impacts virtualized network functions and may allow theft of data and denial of service attacks. A significant vulnerability between different network slices on an operator 5G may leave enterprise customers exposed to malicious cyberattacks. 

AdaptiveMobile Security was the first entity to discover the flaw and shared its findings with the GSM Association (GSMA) on February 4, 2021. The GSMA designated the 5G network weaknesses collectively as CVD-2021-0047.

Meanwhile, 5G is a step up from the current 4G broadband network technology. 5G is a service-based architecture (SBA) that functions by providing a modular framework. That deploys a set of related network functions. 5G allows consumers to discover and authorize their access to a plethora of services. Network functions are responsible for managing sessions, registering subscribers, storing subscriber data. Managing subscriber profiles, and connecting the users to the internet via a base station. Each network function of the SBA can offer a specific service. And at the same time request a service from another network function.

5G Network Slicing

Meanwhile The 5G SBA is a new network concept that opens the network up to new partners. And services, presenting unique security challenges. The slicing model is one of the significant ways the core SBA of the 5G network is compose. Each slice within the core network carries a logical group of network functions exclusively. Assigned to that specific slice or be share among different slices. The creation of separate slices that prioritize unique characteristics such as large bandwidths. Enables a network operator to offer customized solutions to particular industries.

The identified network issue is most likely to cause significant security risks to enterprises dependent on network slicing. And further undermine operator attempts to open new 5G revenues. The risk of attack is still shallow due to the small number of mobile operators. With multiple live network slices on their networks. There are ongoing efforts between mobile security providers, GSMA, network operators. And regulatory bodies to address the 5G network slicing issue and undertake architecture updates to prevent exploitation. 

5G network slicing permits mobile operators to subdivide their core and radio network into multiple distinct virtual blocks meant to provide varying amounts of resources and prioritization of different types of traffic. For example, a mobile broadband network slice can offer entertainment and internet-related services, and the Internet of Things (IoT) slice offers specific retail and manufacturing sector services. In contrast, standalone low latency slices can be use for mission-critical tasks such as healthcare.

The next

Network slicing is a distinctive characteristic of 5G. It allows network operators to provide sections of their core network for specific vertical use cases such as automotive, critical infrastructure, entertainment, and healthcare. The effect is that the web is opene up to numerous partners after slicing into vertical-specific blocks and use cases. An examination of 5G core networks carrying both shared and dedicated network functions by AdaptiveMobile Security indicates that networks that support hybrid network functions with several slices experience a lack of mapping between the transport and application layer identities. 

Because the major flaw in industry standards may have widespread repercussions by creating opportunities for attackers to perpetrate data breaches and launch denial of service attacks across multiple slices after gaining access to the 5G service-based architecture. The situation is grave and may encourage hackers to exploit the network design flaw in slicing standard and gain access to the operator’s core network and the network slices allocated to other enterprises.

5G Network Slicing – by Alessandro Civati

Slicing

Meanwhile, network operators and their customers will be expose and risk losing sensitive location data. Stolen location data can be use to track user location, loss of charging related information, and cause potential interruption to the operation of slices and network functions. The mobile industry is deploying 5G network technology intending to increase efficiency and enhance functionality. The eventual move to 5G is inevitable as it carries numerous benefits. However, there needs to be a mindset change and embracing holistic and collaborative measures to address network security challenges. It calls for concerted efforts from working groups, standard bodies, network operators, and vendors. 

Further research is required to identify if the current defined 5G standards’ mechanisms are sufficient in stopping attackers. The process revealed that the following main attack scenarios could not be prevented as it stands with the network slicing flaw, like a) User data extraction, b) Access to network function and information belonging to vertical customers; and c) Denial of service.

Finally, The core networks move to IT-based architecture and the cloud, and more hacking tools become available to malicious actors. The impact of the network slicing vulnerability on real-world applications is limited to the number of slices within 5G networks. The associated risks would have been significant had the fundamental flaw in 5G standards remained undiscovered. AdaptiveMobile Security recommends countermeasures that include partitioning the network into several security zones and applying signaling security filters between different slices, the core network, and external partners, and the shared and not-shared network functions. 

There’s a need to include signaling layer protection solutions to protect against data leakage attacks that leverage the missing correlation between application and transport layers. Having alerted the industry to the gravity of the 5G network flaw, it is essential to promote best practices in the future, tagging along with all stakeholders. 

Popular

Subscribe to our newsletter


Your emaill address should be use only for updating you on our articles, in the respect of the privacy law

Share post:

More like this
Related

Why Digital Real Estate is Not Just the Metaverse

From virtual reality, to transforming how we interact and communicate on social media, millions of people around the globe are flocking to the next "gold rush."

Now You Can Use NFTs to Purchase Real Estate

Virtual real estate refers to land or property that can be purchased within these environments or games. These digital environments, like the real world, are built with NFT houses, or you can invest in a single NFT apartment in an NFT building.

The Metaverse and Its Use Cases

The metaverse, like the real world, offers an experience to all of its users. While they do not correspond to real-world items, metaverses offer virtual experiences with a variety of items.

Leveraging Managed Services

MSPs are used as strategic partners to improve the operational efficiency of businesses of all sizes, from small and medium-sized (SMBs) to government agencies and nonprofit organizations.