Recent research has unveiled a series of critical security vulnerabilities within the firmware of 5G mobile network modems manufactured by major semiconductor companies, notably MediaTek and Qualcomm. These vulnerabilities affect a range of devices, including USB and Internet of Things (IoT) modems, as well as hundreds of smartphone models operating on both Android and iOS platforms.
Identified as the 5Ghoul vulnerabilities—a term merging “5G” and “Ghoul”—the discovery encompasses 14 distinct flaws, with 10 specifically pertaining to modems produced by MediaTek and Qualcomm. Among these, three vulnerabilities have been classified as high-severity, indicating substantial risks associated with their exploitation.
These vulnerabilities enable attackers to continuously disrupt connectivity, freeze devices, force manual reboots, or downgrade connections from 5G to 4G. The research team, affiliated with the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD), provided detailed insights into these weaknesses in their study.
The impact is extensive, potentially affecting approximately 714 different smartphone models from 24 prominent brands, including companies like Vivo, Xiaomi, Samsung, and Apple. This widespread effect underscores both the scale of the problem and its implications for mobile network security.
Exploitation of the 5Ghoul vulnerabilities can occur through a method in which the attacker deceives a 5G-enabled device into connecting to a rogue base station. This technique does not require the attacker to have any secret information about the target’s device, such as SIM card details. Instead, by impersonating a legitimate base station using standard connection parameters, the attacker can succeed in establishing this malicious connection.
A specific high-severity threat identified as CVE-2023-33042 allows an adversary in close proximity to trigger either a downgrade of 5G connectivity or cause a denial-of-service situation within devices using Qualcomm’s X55/X60 modem firmware. This is achieved through the transmission of malformed Radio Resource Control (RRC) frames from a rogue base station.
Interestingly, the researchers emphasize that while patches for 12 of the 14 vulnerabilities have been released by MediaTek and Qualcomm, two remain undisclosed due to confidentiality concerns. This delay in patch dissemination reflects a broader challenge within the industry, wherein the reliance on chipset vendors introduces complexities and extended timelines for implementing necessary security updates across various devices.
Ultimately, the revelation of these vulnerabilities highlights a critical need for vigilance and proactive measures in cybersecurity strategy among stakeholders within the mobile technology ecosystem. Addressing such vulnerabilities swiftly is essential to safeguard against potential exploitation and maintain the integrity of mobile network communications.