The researchers developed a vulnerability discovery tool called LTEInspector, which found a total of 19 security vulnerabilities, including nine known vulnerabilities and attacks against new vulnerabilities related to the attachment in the LTE protocol, , Detach and Paging programs.
With these vulnerabilities, hackers will be able to fake users of mobile devices to send messages, eavesdrop on phone calls or messages, fake locations, or break devices.
Relevant vulnerabilities exist in the LTE protocol, in theory, will have a global impact, but researchers do not think this stage can be repaired or other solutions because, if not endanger the backward compatibility in the The new security mechanisms in LTE are just a cumbersome solution; they are also not sure if they can successfully withstand attacks without major overhauls of infrastructure or agreements; a possible solution is to use distance-bound protocols, but in practice On rare occasions, coupled with the stringent performance requirements of 4G LTE, various public-key-based solutions are not feasible. In conclusion, the defensive mechanism that takes efficiency, flexibility and security into consideration has to rely on further investigation.