August 26, 2016 By Larry Loeb 2 min read

Simone Margaritelli of the security research firm Zimperium zLabs, the company that found the Stagefright bug, posted a report that outlined how base transceiver stations (BTS) running the most common open source software products are vulnerable to attacks. The software for BTS stations is vulnerable to three separate attacks that can be used to ultimately hijack a cell tower.

Impersonating BTS Stations

A BTS station operates cellular phone GSM, UMTS and LTE networks. It functions as the digitizer for received radio waves from the cellphone. Communication with the rest of the units is handled through three user datagram protocol (UDP) sockets: clock, command and data.

Zimperium said that all the most commonly available BTS software shares the same or a very similar transceiver code base — meaning all the code used for BTS is open to the same vulnerabilities.

The vulnerabilities found could allow an adversary to remotely control the BTS transceiver module. Functionalities would then be compromised, and an attacker could impersonate a parallel BTS. Criminals could send GSM data bursts to the transceiver to enable a wide range of attacks, such as IMSI detaching, encryption downgrading and denial-of-service.

Three Vulnerabilities

The first vulnerability Zimperium found is an “overly exposed service binding.” The network library that is part of the software makes the transceiver UDP sockets blind to any IP address instead of the user-configured one.

An attacker could exploit this to receive and send packets from the transceiver. But more importantly, any service exposed on these UDP network sockets is not directly protected by an authentication mechanism.

A second issue is remote code execution via a stack overflow, which may be caused by a specially crafted UDP sent to the control channel. This can also cause denial-of-service problems.

Finally, the third vulnerability is “remote unauthenticated control.” Because the control channel has no authentication and is exposed to the full network due to the service binding problem, attackers could use this socket to gain control of the transceiver module remotely. They would not need authentication credentials to do it.

Jamming the System

Softpedia noted that such an attacker could turn the BTS off, jam antenna radio frequencies or change the BTS identity. This might have the effect of removing the BTS from the mobile operator’s network or causing it to behave like another station from the same network. Man-in-the-middle (MitM) attacks would also be possible.

Most of the affected programs have patches available to mitigate these vulnerabilities. Carriers must ensure the patches are deployed quickly and the BTS software updated to avoid some massive problems.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today