Vulnerabilities in LTE and 5G networks 2020
June 10, 2020
With new 5G networks, mobile operators face numerous challenges. One of them is the GTP protocol, used alongside SS7 and Diameter on core networks to transmit user and control traffic.
The problem for operators is that the GTP protocol can be exploited by attackers. Vulnerabilities leave the door open to denial of service and fraud.
To foresee GTP-related issues in the 5G context and outline preventive measures to ensure full 5G network protection, Positive Technologies has released its latest report on GTP security.
This is the concluding paper in our four-part research series on core vulnerabilities and threats in the mobile ecosystem. Operators can refer to it for a picture of GTP threats and expert recommendations on how to proactively counter fraud.
You do not have the required permissions to view the files attached to this post.