4G LTE burst multiple vulnerabilities, fake users to send information, but also eavesdropping on the phone

Researchers from the Purdue University and the University of Iowa in the United States recently published a research report stating that the 4G LTE protocol contains many loopholes that allow hackers to spoof user identities and transmit information, fake device locations, and even Disconnect other devices.

The researchers developed a vulnerability discovery tool called LTEInspector, which found a total of 19 security vulnerabilities, including nine known vulnerabilities and attacks against new vulnerabilities related to the attachment in the LTE protocol, , Detach and Paging programs.

With these vulnerabilities, hackers will be able to fake users of mobile devices to send messages, eavesdrop on phone calls or messages, fake locations, or break devices.

Relevant vulnerabilities exist in the LTE protocol, in theory, will have a global impact, but researchers do not think this stage can be repaired or other solutions because, if not endanger the backward compatibility in the The new security mechanisms in LTE are just a cumbersome solution; they are also not sure if they can successfully withstand attacks without major overhauls of infrastructure or agreements; a possible solution is to use distance-bound protocols, but in practice On rare occasions, coupled with the stringent performance requirements of 4G LTE, various public-key-based solutions are not feasible. In conclusion, the defensive mechanism that takes efficiency, flexibility and security into consideration has to rely on further investigation.

2016 GoodChinaBrand | ICP: 12011751 | China Exports