The news: Security researchers have identified 11 design vulnerabilities with 5G protocols which could expose a user’s location, spoof emergency alerts, track their phone activity (calls, texts, or web browsing), or silently disconnect their phone from the network altogether.
How do they know?: The flaws were identified using a custom tool the researchers built called 5GReasoner, which they used to identify five further vulnerabilities carried over from 3G and 4G. The findings were presented at a security conference in London yesterday. You can read the paper here.
Real Life. Real News. Real Voices
Help us tell more of the stories that matterBecome a founding member
Time is running out: Although they still face technical and regulatory barriers, 5G networks are starting to roll out in a few major cities worldwide, offering faster speeds and (we are told) greater security for users. Plugging these security holes will be an urgent task.
What’s next: The researchers have now sent their findings to the mobile networks standards body, the GSMA, which has said it is working on fixes. The body has already listed the research in its “Hall of Fame.”
Subscribe to the newsletter news
We hate SPAM and promise to keep your email address safe