New error detection in 4G LTE protocol
Scientists from Purdue and Iowa University have discovered new vulnerabilities in the main protocol of the 4G LTE mobile network - currently very popular in the world.
The vulnerability affects the process of mounting, splitting, wrapping - part of Long Term Evolution (LTE), the high-speed wireless communication standard on mobile devices.
The vulnerability can lead to blocking or falsifying messages
The researchers say the bug allows an attacker to connect to the 4G LTE network without authentication. By connecting via another user identity, the attacker sends a message that fakes the user, blocks the message, fakes the device's address and even forces other devices to disconnect from the network.
New error detection in 4G LTE protocol Picture 1
4G LTE is not yet 4G, but is very popular
Researchers worry that this error will be used in practice to hide crime. For example, an offender in the United States can assume the address as if he were in Europe.
Vulnerability using LTEInspector tool
Researchers use a special tool called LTEInspector to detect these errors - 10 new vulnerabilities and 9 known vulnerabilities. They also demonstrate the accuracy of their tools by exploiting 8 of the 10 new vulnerabilities by testing and faking the network, using the available software.
Each error found by LTEInspector is detailed in the research report. This tool is also available for free on GitHub.https://github.com/relentless-warrior/LTEInspector
See more:
- Are 4G and 4G LTE networks the same?
- Learn about 5G network, future mobile platform
You should read it
- How to protect high-risk network ports?
- How to fix Network Protocols errors are Missing on Windows?
- The world's first 5G network launched in Qatar
- Data analysis with Network Monitor
- Popular network protocols today
- London will have 5G network by 2020
- VPN theory - What is a virtual private network?
- What is UPnP?
- Knowledge of TCP / IP network protocols
- Common myths about 4G networks
- Things to know about 4G networks
- What is the 5G network?
May be interested
The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
Bkav released a free detection tool for Meltdown and Specter
It turns out this is how hackers attack your computer through the main screen
Windows 10 vulnerability from Cortana helps hackers open unauthorized malicious websites and how to fix them
Hackers can use Ransomware to attack and control robots
Warning: 5 million Samsung, OPPO, Vivo smartphones ... are infected with malware and this is how to check and remove