Close
Saturday, March 22, 2025

AdaptiveMobile Security reckons 5G network slicing contains a major security flaw

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from any location or device.

Media Packs

Expand Your Reach With Our Customized Solutions Empowering Your Campaigns To Maximize Your Reach & Drive Real Results!

– Access the Media Pack Now

– Book a Conference Call

– Leave Message for Us to Get Back

Related stories

How to make the most of a mobile connection: a complete guide to 4G amplifiers

Multiple users assume that a stable mobile connection is...

Cellnex Showcases Network Solutions at MWC 2025

Cellnex shows the systems meant to handle the growing...

Verizon Achieves First-Ever Satellite-to-Cell Video Call

By effectively doing a live video conversation via satellite,...

Deutsche Telekom Debuts Drone-Based Mobile Base Station

Deutsche Telekom has first deployed a drone as a...

Research published by mobile security specialist AdaptiveMobile claims all the extra complexity created by network slicing leads to new vulnerabilities.

Network slicing involves the virtual partitioning of the RAN and core to create ‘slices’ of the network that can be tailored to specific use cases. It seems that virtual network functions spanning many slices have insufficient mapping between the application and transport layers identities. ‘This flaw in the industry standards has the impact of creating an opportunity for an attacker to access data and launch denial of service attacks across multiple slices if they have access to the 5G Service Based Architecture,’ says the press release.

“As more of the core network moves to the cloud and an IT-based architecture, so more suitable hacking tools become available for hackers,” said Dr. Silke Holtmanns, Head of 5G Security Research at AdaptiveMobile Security. “Currently, the impact on real-world applications of this network slicing attack is only limited by the number of slices live in 5G networks globally.

“The risks, if this fundamental flaw in the design of 5G standards had gone undiscovered, are significant. Having brought this to the industry’s attention through the appropriate forums and processes, we are glad to be working with the mobile network operators and standards communities to highlight these vulnerabilities and promote best practice going forward.”

You can access the full white paper here, which is reassuringly full of arcane jargon and baffling diagrams. The complexity of 5G NR networks, with all their virtualization, slicing and general mucking about, was always bound to create new vulnerabilities. Hopefully reports such as this will help to ensure the telecoms industry doesn’t sacrifice security in its desperation for 5G ROI.

Latest stories

Related stories

How to make the most of a mobile connection: a complete guide to 4G amplifiers

Multiple users assume that a stable mobile connection is...

Cellnex Showcases Network Solutions at MWC 2025

Cellnex shows the systems meant to handle the growing...

Verizon Achieves First-Ever Satellite-to-Cell Video Call

By effectively doing a live video conversation via satellite,...

Deutsche Telekom Debuts Drone-Based Mobile Base Station

Deutsche Telekom has first deployed a drone as a...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from any location or device.

Media Packs

Expand Your Reach With Our Customized Solutions Empowering Your Campaigns To Maximize Your Reach & Drive Real Results!

– Access the Media Pack Now

– Book a Conference Call

– Leave Message for Us to Get Back