August 26, 2016 By Larry Loeb 2 min read

Simone Margaritelli of the security research firm Zimperium zLabs, the company that found the Stagefright bug, posted a report that outlined how base transceiver stations (BTS) running the most common open source software products are vulnerable to attacks. The software for BTS stations is vulnerable to three separate attacks that can be used to ultimately hijack a cell tower.

Impersonating BTS Stations

A BTS station operates cellular phone GSM, UMTS and LTE networks. It functions as the digitizer for received radio waves from the cellphone. Communication with the rest of the units is handled through three user datagram protocol (UDP) sockets: clock, command and data.

Zimperium said that all the most commonly available BTS software shares the same or a very similar transceiver code base — meaning all the code used for BTS is open to the same vulnerabilities.

The vulnerabilities found could allow an adversary to remotely control the BTS transceiver module. Functionalities would then be compromised, and an attacker could impersonate a parallel BTS. Criminals could send GSM data bursts to the transceiver to enable a wide range of attacks, such as IMSI detaching, encryption downgrading and denial-of-service.

Three Vulnerabilities

The first vulnerability Zimperium found is an “overly exposed service binding.” The network library that is part of the software makes the transceiver UDP sockets blind to any IP address instead of the user-configured one.

An attacker could exploit this to receive and send packets from the transceiver. But more importantly, any service exposed on these UDP network sockets is not directly protected by an authentication mechanism.

A second issue is remote code execution via a stack overflow, which may be caused by a specially crafted UDP sent to the control channel. This can also cause denial-of-service problems.

Finally, the third vulnerability is “remote unauthenticated control.” Because the control channel has no authentication and is exposed to the full network due to the service binding problem, attackers could use this socket to gain control of the transceiver module remotely. They would not need authentication credentials to do it.

Jamming the System

Softpedia noted that such an attacker could turn the BTS off, jam antenna radio frequencies or change the BTS identity. This might have the effect of removing the BTS from the mobile operator’s network or causing it to behave like another station from the same network. Man-in-the-middle (MitM) attacks would also be possible.

Most of the affected programs have patches available to mitigate these vulnerabilities. Carriers must ensure the patches are deployed quickly and the BTS software updated to avoid some massive problems.

More from

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today