August 26, 2016 By Larry Loeb 2 min read

Simone Margaritelli of the security research firm Zimperium zLabs, the company that found the Stagefright bug, posted a report that outlined how base transceiver stations (BTS) running the most common open source software products are vulnerable to attacks. The software for BTS stations is vulnerable to three separate attacks that can be used to ultimately hijack a cell tower.

Impersonating BTS Stations

A BTS station operates cellular phone GSM, UMTS and LTE networks. It functions as the digitizer for received radio waves from the cellphone. Communication with the rest of the units is handled through three user datagram protocol (UDP) sockets: clock, command and data.

Zimperium said that all the most commonly available BTS software shares the same or a very similar transceiver code base — meaning all the code used for BTS is open to the same vulnerabilities.

The vulnerabilities found could allow an adversary to remotely control the BTS transceiver module. Functionalities would then be compromised, and an attacker could impersonate a parallel BTS. Criminals could send GSM data bursts to the transceiver to enable a wide range of attacks, such as IMSI detaching, encryption downgrading and denial-of-service.

Three Vulnerabilities

The first vulnerability Zimperium found is an “overly exposed service binding.” The network library that is part of the software makes the transceiver UDP sockets blind to any IP address instead of the user-configured one.

An attacker could exploit this to receive and send packets from the transceiver. But more importantly, any service exposed on these UDP network sockets is not directly protected by an authentication mechanism.

A second issue is remote code execution via a stack overflow, which may be caused by a specially crafted UDP sent to the control channel. This can also cause denial-of-service problems.

Finally, the third vulnerability is “remote unauthenticated control.” Because the control channel has no authentication and is exposed to the full network due to the service binding problem, attackers could use this socket to gain control of the transceiver module remotely. They would not need authentication credentials to do it.

Jamming the System

Softpedia noted that such an attacker could turn the BTS off, jam antenna radio frequencies or change the BTS identity. This might have the effect of removing the BTS from the mobile operator’s network or causing it to behave like another station from the same network. Man-in-the-middle (MitM) attacks would also be possible.

Most of the affected programs have patches available to mitigate these vulnerabilities. Carriers must ensure the patches are deployed quickly and the BTS software updated to avoid some massive problems.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today