GSM Association Non-Confidential Official Document FS.40 - 5G Security Guide
GSM Association Non-Confidential Official Document FS.40 - 5G Security Guide
5G Security Guide
Version 2.0
20 October 2021
Copyright Notice
Copyright © 2023 GSM Association
Disclaimer
The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept
any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document.
The information contained in this document may be subject to change without prior notice.
Antitrust Notice
The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.
Contents
1 Introduction 6
1.1 Overview 6
1.2 Scope 6
1.3 Abbreviations 7
1.4 References 11
2 Summary of New Security Features in 5G 17
2.1 Unified Authentication Framework & Access-Agnostic Authentication 17
2.2 Primary Authentication 17
2.3 Secondary Authentication 17
2.4 Increased Home Control 18
2.5 Enhanced Subscriber Privacy 18
2.6 RAN Security 18
2.6.1 Security for Integrated Access and Backhaul in EN-DC 19
2.7 Service Based Architecture 20
2.8 Roaming Security 21
2.8.1 Roaming interfaces between PLMNs except for N32 21
2.8.2 Secure Edge Protection Proxy (SEPP) 21
2.9 5GS-EPS Interworking Security 21
2.10 LTE-NR Dual Connectivity (EDCE5) 21
2.11 Non Public Networks (NPN) 22
2.12 5G Single Radio Voice Call Continuity (SRVCC) from NR to UTRAN 22
2.13 Security for URLLC (Ultra-Reliable Low-Latency Communication) services 22
2.14 Security For Time Sensitive Communications (TSC) 23
2.15 Security for 5GLAN services 23
2.16 Security for Trusted non-3GPP access to the 5G core network 23
2.17 Security for wireline access to the 5G core network 25
2.18 UE Security Visibility and Configurability 27
2.19 Cryptographic Enhancments 27
2.20 Network Slice Security 28
3 New Elements and Functions in 5G Security Architecture 28
3.1 SEPP: Secure Edge Protection Proxy (Network Entity, NF) 28
3.2 AMF: Access and Mobility Management function 29
3.3 SEAF: Security Anchor Function (in serving network's AMF) 29
3.4 AUSF: Authentication Server Function (in home network) 30
3.5 UDM/ARPF: Unified Data Management/Authentication Credential
Repository and Processing Function 30
3.6 UDM/SIDF: Unified Data Management/Subscription Identifier De-
concealment Function 31
3.7 SCP: Service Communication Proxy 31
3.8 IPUPS: Inter PLMN UP Security 32
3.9 NSSAAF: Network Slice Specific Authentication and Authorisation Function 33
4 5G Enhancements in Subscription Identifier Privacy 34
4.1 SUPI and SUCI 34
Page 2 of 106
GSM Association Non-confidential
5G Security Guide
Page 3 of 106
GSM Association Non-confidential
5G Security Guide
Page 4 of 106
GSM Association Non-confidential
5G Security Guide
Page 5 of 106
GSM Association Non-confidential
5G Security Guide
1 Introduction
1.1 Overview
The fifth generation (5G) telecommunication system will deliver enhanced mobile
broadband, massive machine type communications, and ultra-reliable and low latency
communications to subscribers. 5G will also provide multi-network slicing, multi-tenancy,
multi-level of services and multi-connectivity network capabilities to initiate the vertical
industry to join the operation and development of the 5G services regime.
Alongside the new capabilities in 5G, there are also changes in how networks are built and
managed. These include virtualisation and containerisation, network function virtualisation
(NFV), open source software, SDN security monitoring, security assurance, security of O-
RAN interfaces and components, network slicing, programmable network, multi-access edge
computing (MEC) and combined development and operations functions, so called DevOps.
These new techniques will give future networks flexibility and agility in developing and
deploying services and network infrastructures. However, they also introduce new attack
vectors in next generation telecommunications systems and the organisations that use them.
It is noteworthy that considerable thought has gone into the planning and design of the
security enhancements realised in 5G. These efforts have been contributed to by a range of
industry stakeholders as well as government agencies such as the German Bundesamt fuer
Sicherheit in der Informationstechnik (BSI) and the National Technology Security Coalition
(NTSC) in the USA. This has seen the introduction of security enhancements such as default
mandatory encryption of network and privacy sensitive information as well as other principles
based concepts including:
Use of mutual authentication – ensure that sender and receiver have an established
trusted and secured relationship
Assume zero trust – operate on the basis of not automatically trusting anybody or
anything inside or outside the network perimeter
Do not assume transport links are secure – use encryption to ensure any
compromised information is of no value to recipients.
1.2 Scope
Unless stated otherwise, the discussions in this document refer to the capabilities supported
by 3GPP Release 16, i.e. the second release of 3GPP standards for 5G. The content of this
version 2.0 reflects current understanding in 2021.
Further updates of this document will be made to reflect the 3GPP work on future 5G
Releases. The next version of the document is planned for 2022 to ensure the document
reflects Release 17.
Page 6 of 106
GSM Association Non-confidential
5G Security Guide
1.3 Abbreviations
Term Description
5GC 5G Core Network
5G-RG 5G Residential Gateway
5GS 5G System
5GSTF GSMA 5G Security Task Force
AI Artificial Intelligence
AKA Authentication and Key Agreement
ALS Application Layer Security
AMF Core Access and Mobility Management Function
ARPF Authentication credential Repository and Processing Function(ality)
ASN.1 Abstract Syntax Notation One
AUSF Authentication Server Function
AV Authentication Vector
BGP Border Gateway Protocol
BSR Binding Security Requirement
CAP Camel Application Protocol
CDR Call Detail Record
cIPX IPX-Provider of the service consumer PLMN
CIRM Cloud Infrastructure Reference Model
CN Core Network
CNTT Cloud iNfrastructure Telecom Taskforce
COTS Commercial Off The Shelf
CP Control Plane
CRAN Cloud Radio Access Network
cSEPP Consumer Security Edge Protection Proxy
CSP Communication Service Provider
CSRIC Communications Security, Reliability and Interoperability Council
CU-DU Central Unit Distributed Unit
CVD Coordinated Vulnerability Disclosure
DDoS Distributed Denial of Service
DEA Diameter Edge Agent
DNS Domain Name Server
EAP Extensible Authentication Protocol
ECIES Elliptic Curve Integrated Encryption Scheme
EAP-AKA Extensible Authentication Protocol – Authentication and Key Agreement
Page 7 of 106
GSM Association Non-confidential
5G Security Guide
Term Description
EDCE5 EPC enhancements to support 5G New Radio via Dual Connectivity
EECC European Electronic Communications Code
eMBB Enhanced Mobile BroadBand
E-UTRA Evolved Universal Terrestrial Radio Access
EPS Evolved Packet System
FMS Fraud Management System
FN-RG Fixed Network Residential Gateway
GDPR General Data Protection Regulation
gNB Next Generation Node B
GRX GPRS Roaming Exchange
GTP GPRS Tunneling Protocol
GTP-C GPRS Tunneling Protocol – Control
GTP-U GPRS Tunneling Protocol – User Data
GUTI Globally Unique Temporary Identifier
HPLMN Home Public Land Mobile Network
HSM Hardware Security Module
HTTP/2 Hypertext Transfer Protocol version 2
IAB Integrated Access and Backhaul
IMS IP Multimedia Subsystem
IMSI International Mobile Subscriber Identity
IoT Internet of Things
IPRAN IP Radio Access Network
IPUPS Inter-PLMN User Plane Security
IPX IP Exchange
ISO International Organization for Standardization
JSON JavaScript Object Notation
LLS Lower Layer Split
LTE Long Term Evolution
MANO Management And Network Orchestration
MIB Master Information Block
MSIN Mobile Subscriber Identification Number
MCC Mobile Country Code
MCData Mission Critical Data
MCPTT Mission Critical Push To Talk
MCS Mission Critical Services
MCVideo Mission Critical Video
MEC Mobile / Multi-Access Edge Computing
MISP Malware Information Sharing Platform
Page 8 of 106
GSM Association Non-confidential
5G Security Guide
Term Description
MITM Man-In-The-Middle
MME Mobility Management Entity
MNC Mobile Network Code
MNO Mobile Network Operators
MPS Multimedia Priority Service
MR Measurement Report
MR-DC Multi-RAT Dual Connectivity
N3IWF Non-3GPP Inter-Working Function
N5FC Non-5G-Capable devices
N5CW Non-5G-Capable over WLAN
NaaS Network as a Service
NAI Network Access Identifier
NAS Non-Access Stratum
NDS/IP Network Domain Security / Internet Protocol
NESAS Network Equipment Security Assurance Scheme
NF Network Function
NFV Network Function Virtualisation
NFVI Network Function Virtualisation Infrastructure
ng-eNB Next Generation Evolved Node B
NPN Non Public Networks
NR New Radio
NSA Non-Stand Alone
NSaaS Network Slice as a Service
NSI Network Slice Instance
NSSAAF Network Slice Specific Authentication and Authorization Function
NSSF Network Slice Selection Function
O-DU O-RAN Distributed Unit
OITF Open Infrastructure Task Force
O-RAN Open RAN
O-RU O-RAN Radio Unit
OS Operating System
OSS Open Source Software
PDCA Plan–Do–Check–Act or Plan–Do–Check–Adjust
PDR Packet Detection Rule
PFCP Packet Forwarding Control Protocol
pIPX IPX-Provider of the service producer PLMN
PKI Public Key Infrastructure
PLMN Public Land Mobile Network
Page 9 of 106
GSM Association Non-confidential
5G Security Guide
Term Description
POI Point Of Interconnect
PRD Permanent Reference Document
pSEPP Producer Security Edge Protection Proxy
PSK Pre-shared Secret Key
RADIUS Remote Authentication Dial-In User Service
RAN Radio Access Network
RAND RANDom Number
REST Representational State Transfer
RESTFUL REST Conformant
RPKI Resource Public Key Infrastructure
RRC Radio Resource Control
SA Stand-Alone
SAAS Software as a Service
SBA Service Based Architecture
SBOM Software Bill Of Materials
SCAS Security Assurance Specification
SCP Service Communication Proxy
SDM Software Defined Monitoring
SDMN Software Defined Mobile Networks
SDN Software Defined Networks
SDO Software Defined Operations
SDR Software Defined Radios
SEAF Security Anchor Function(ality)
SECAM Security Assurance Methodology
SeGW Security Gateway
SEPP Secure Edge Protection Proxy
SIDF Subscription Identifier De-concealment Function(ality)
SIEM Security Information and Event Management
SIP Session Initiation Protocol
SMF Session Management Function
SMSoIP SMS over IP
SMSoNAS SMS over NAS
SON Self-Organising Networks
SoR Steering of Roaming
SRVCC Single Radio Voice Call Continuity
SS Synchronisation Signal
SSH Secure Shell
SUCI Concealed Subscription Identity
Page 10 of 106
GSM Association Non-confidential
5G Security Guide
Term Description
SUPI Permanent Subscription Identity
T-ISAC Telecommunication Information Sharing & Analysis Centre
TCB Trusted Computing Base
TCP Transmission Control Protocol
TLS Transport Layer Security
TN Transmission Network
TNAN Trusted Non-3GPP Access Network
TNAP Trusted Non-3GPP Access Point
TNGF Trusted Non-3GPP Gateway Function
TPM Trust Platform Module
TSC Time Sensitive Communications
TTP Tactics, Techniques and Procedures
TWIF Trusted WLAN Interworking Function
UAC Unified Access Control
UDM Unified Data Management
UE User Equipment
UICC Universal Integrated Circuit Card
UP User Plane
UPF User Plane Function
URLLC Ultra-Reliable Low-Latency Communication
USIM Universal Subscriber Identity Module
VPLMN Visited Public Land Mobile Network
W-5GAN Wireline 5G Access Network
W-AGF Wireline Access Gateway Function
WAF Web Application Firewall
WEF World Economic Forum
1.4 References
Ref Doc Number Title
[1] 3GPP TS 33.501 Security architecture and procedures for 5G
[2] IETF RFC 7540 Hypertext Transfer Protocol Version 2 (HTTP/2)
[3] IETF RFC 793 Transmission Control Protocol (TCP)
[4] IETF RFC 7159 The JavaScript Object Notation (JSON) Data Interchange Format
[5] GSMA PRD IR.73 Steering of Roaming Implementation Guidelines
[6] GSMA PRD FS.07 SS7 and SIGTRAN Network Security
[7] GSMA PRD FS.11 SS7 Interconnect Security Monitoring and Firewall Guidelines
[8] GSMA PRD IR.82 SS7 Security Network Implementation Guidelines
[9] GSMA PRD FS.19 Diameter Interconnect Security
Page 11 of 106
GSM Association Non-confidential
5G Security Guide
Page 12 of 106
GSM Association Non-confidential
5G Security Guide
Page 13 of 106
GSM Association Non-confidential
5G Security Guide
Page 14 of 106
GSM Association Non-confidential
5G Security Guide
Page 15 of 106
GSM Association Non-confidential
5G Security Guide
Page 16 of 106
GSM Association Non-confidential
5G Security Guide
The key aspects of the security features inherent in the 5G specifications are described in
the sections below. For further details please refer to the appropriate 3GPP standards such
as TS 23.501 [31] and TS 33.501 [1].
Page 17 of 106
GSM Association Non-confidential
5G Security Guide
The SMF (Session Management Function) shall perform the role of the EAP
Authenticator.
Note: For roaming users the Home-PLMN (HPLMN) will send the Subscription
Permanent Identifier (SUPI) after successful completion of the authentication
procedure by the HPLMN, which can support lawful intercept solutions.
Note Null-scheme would provide no privacy protection over the air interface but
maybe required by some regulatory environments
SUPI is decoupled from paging procedure, i.e. no paging of the UE using SUPI is
allowed, and paging occasions use temporary identifier
Use of 5G Global Unique Temporary Identifier (5G-GUTI) with stricter temporary
subscription identifier refreshment requirements
Initial NAS message ciphering
In addition, special care should be given to the privacy protection with CDRs that leave the
home network because these will need to include the SUPI to allow billing, accounting and
monitoring processes. Hence, it is advised that CDR records that are transferred from one
network to the other should be encrypted.
Page 18 of 106
GSM Association Non-confidential
5G Security Guide
RAN with the (F1) signalling interface connecting the gNB-CU to the gNB-DU and the
E1 signalling interface connecting the gNB-CU-CP)
Support for certificate enrolment mechanism and the gNB supports a verify software
updates function before installation
Support PDCP Counter check to detect maliciously inserted packets.
IAB uses the CU/DU architecture, the IAB operation via F1 (between IAB-donor and
IAB-node) is invisible to the 5GC.
IAB performs relaying at layer-2, supports multi-hop backhauling and dynamic
topology updates.
Page 19 of 106
GSM Association Non-confidential
5G Security Guide
Page 20 of 106
GSM Association Non-confidential
5G Security Guide
Home Stratum/
(I) (I) (I) Serving Stratum
ME (III)
USIM
(V)
(II)
HE
(I)
SN
Transport Stratum
3GPP AN
(I)
(I) (II)
Non-3GPP AN
Page 21 of 106
GSM Association Non-confidential
5G Security Guide
DC provides higher per-user throughput and mobility robustness, and load balancing
by using 2 base stations
5G New Radio (NR) attached to 4G EPC using Dual Connectivity approach
LTE security algorithms and procedures similar to LTE are used
N2
N4
N3 Tunnel 1
UE N6
NG-RAN UPF DN
N3
N3 Tunnel 2
Figure 3 – Redundant transmission with two N3 tunnels between the UPF and a single
NG-RAN node
Page 22 of 106
GSM Association Non-confidential
5G Security Guide
Figure 4 – 5G system modelled IEEE 802.1AS compliant for TSN time synchronization
Page 23 of 106
GSM Association Non-confidential
5G Security Guide
Figure 6 – Non-roaming architecture for 5GC Network with trusted non-3GPP access
UE registers to the 5GC via the TNAN using the EAP-5G procedure
The security relies on Layer-2 security between UE and TNAP, which is a trusted
entity so that no IPSec encryption is necessary between UE and TNGF, i.e. NULL
encryption is sufficient for the user plane and signalling
Separate IPSec SAs may be used for NAS transport and PDU Sessions
Authentication for trusted non-3GPP access based on EAP-5G
Authentication for devices that do not support 5GC NAS over WLAN access based
on EAP-AKA’.
Support for subscriber privacy for Non-5G-Capable over WLAN (N5CW) over trusted
WLAN access (5G-GUTI and SUCI)
Key hierarchy for trusted non-3GPP access as shown in Figure 7.
Page 24 of 106
GSM Association Non-confidential
5G Security Guide
AMF
KTNGF
ME
KTNGF
KTIPSec KTNAP
IPSec SA
Child SAs
TNGF ME TNAP ME
Page 25 of 106
GSM Association Non-confidential
5G Security Guide
N2 N11
N3
N1 N2
N4
W-AGF
W-5GAN
Figure 8 – Non-roaming architecture for 5GC for 5G-RG with W-5GAN and NG RAN
N11
AMF SMF
N2
N4
Y5
FN-RG W-AGF
W-5GAN
Figure 9 – Non-roaming architecture for 5GC for FN-RG with W-5GAN and NG RAN
To support Wireless and Wireline Convergence for the 5G system, two new network
entities, 5G-RG and FN-RG are introduced.
Support for 5G-RG Authentication via NG-RAN and W-5GAN (authentication method
EAP-5G).
5G-RG supports 5G-AKA and EAP-AKA’ and authenticated by the 3GPP home
network
The FN-RG is authenticated by the W-AGF. Authentication method used for FN-RG
is defined by the Broadband Forum or CableLabs and out of scope of 3GPP.
5G-RG supports subscriber privacy for wireline access (5G-GUTI and SUCI)
Page 26 of 106
GSM Association Non-confidential
5G Security Guide
N2 interface between the W-5GAN and the AMF protected with IPsec ESP and
IKEv2 certificates-based authentication.
N3 interface between the W-5GAN and the UPF protected with IPsec ESP and IKEv2
certificate-based authentication.
Support for authentication for non-5G capable devices (N5GC) behind residential
gateways (RGs) in private networks or in isolated deployment scenarios wireline
access based on EAP methods.
Integrity, confidentiality, and replay protected.
CRL profile
Signature algorithm - RSAEncryption no longer recommended.
MD5 MD2, and SHA-1 shall not be supported.
ECDSA: Except curve25519, ed25519, and W-25519, elliptic curve groups of less
than 256 bits shall not be supported. A key length of at least 384-bit shall be
supported.
Page 27 of 106
GSM Association Non-confidential
5G Security Guide
Page 28 of 106
GSM Association Non-confidential
5G Security Guide
Note: The information transfer over the N32 interface needs to be encrypted as the
N32 interface is also used for sensitive information e.g. sending key material
during authentication procedure.
The enhanced security in 5G of the mobile roaming services is introduced to overcome the
existing security risks linked to SS7 and Diameter usage. This introduction of a dedicated
security node within the 5G standards is a major improvement over the existing practices in
4G/3G/2G networks with SS7 and Diameter, where security functions were introduced many
years after the 4G/3G/2G technology had already been standardised and deployed. Please
refer to section 11 for more details.
Page 29 of 106
GSM Association Non-confidential
5G Security Guide
Note: The MME is the related functional component in an LTE Core Network (CN).
Note: TS 33.501 [1] and FS.43 [90] define the requirements for storing the
authentication credentials encrypted in a secure hardware component. The
requirements for the Hardware Security Module (HSM) can be found in
section 12 of this document as part of the section on “Impact of Cloud on 5G
Security”.
Note: For roaming users the HPLMN sends the SUPI after successful completion
of the authentication procedure by the HPLMN to assist lawful intercept
solutions.
Page 30 of 106
GSM Association Non-confidential
5G Security Guide
It is outside the scope of 3GPP’s work to define how the SIDF (Subscription Deconcealment
Function for SUCI -> SUPI) is implemented as an integrated UDM/SIDF, or as separate
SIDF instances.
By design, many functions resident in network functions have been pulled apart and defined
as separate functions in 5G. In a software defined network it is important to be able to add
resources where they are needed most, and not have to add resources to an entire entity. If
there is a need more computing resources for the SIDF, but not for the UDM, then it should
be possible to add the necessary resources for the SIDF without impacting the UDM.
Page 31 of 106
GSM Association Non-confidential
5G Security Guide
Operator Legend:
NRF
policies Non-SCP 5GC
functionality
Nnrf Service Mesh
components
Page 32 of 106
GSM Association Non-confidential
5G Security Guide
NSSAAF
VPLMN HPLMN
Table 1 illustrates security related services for Network Slice Specific Authentication and
Authorisation that NSSAAF provides
For more details about Network Slicing see the descriptions in section 13.
Page 33 of 106
GSM Association Non-confidential
5G Security Guide
The Subscription Concealed Identifier (SUCI) is the encrypted SUPI that includes the Mobile
Country Code (MCC) and Mobile Network Code (MNC) and the encrypted Mobile
Subscription Identity Number (MSIN), which is encrypted with the public key of the home
operator. Additional parameters are used for home routing and AUSF/UDM selection, key
set identifier, ephemeral public key (ECIES scheme), and MAC tag.
In addition, there is no longer a paging option based on SUPI. The calculation of the paging
frame index and paging occasions is no longer based on SUPI and is instead based on 5G-
GUTI. As a result, with this enhancement is infeasible for false base stations to use paging
messages for identifying or tracing subscribers.
Page 34 of 106
GSM Association Non-confidential
5G Security Guide
In addition, the presence of false base stations can be detected by data in measurement
reports from devices and the 5G system like the detection of a 2G false base station is
detected in a Mobile Network Operator’s (MNO) network without any 2G deployment or
when the received signal of a base station deviates from the expected value.
5 Authentication in 5G
Compared to authentication in 2/3/4G networks, 5G authentication, is specified in 3GPP TS
33.501 [1][1] as a mandatory procedure and offers the following novel aspects.
Note: There is no process where the visited network must first authenticate prior to
this. The visiting network has the power to reject the authentication request
by the UE, but successful authentication needs to be done by the home
network and then signalled back to the visited PLMN (VPLMN).
The above aspects enable the home network to potentially exercise more stringent control
over the privacy and experience of its roaming subscribers and over the network's exposure
to fraud. The challenge is to create incentives for operators, both in the role of "home" and
"visited" networks, and for "home" operators to mandate the use of these mechanisms
whenever possible. GSMA could assume a role to create incentives and offer support to
achieve this goal. In this regard, the feasibility of the following ideas could be examined.
Page 35 of 106
GSM Association Non-confidential
5G Security Guide
The 5GS introduces a control plane SOR solution that allows the HPLMN to direct the UE
during or after registration on the VPLMN. Details on the interfaces and how the registration
process occurs in a 5G System (5GS) can be found in 3GPP TS 23.501 (Rel. 15) [31] and
3GPP TS 24.501 (Rel.15) [26], respectively.
The solution allows the HPLMN to update the "Operator Controlled PLMN Selector with
Access Technology" list in the UE by providing the HPLMN protected list of preferred
PLMN/access technology combinations via NAS signaling.
The general description and the procedural flows are specified in 3GPP TS 23.501 (Rel. 15)
[31][31] and 3GPP TS 24.501 (Rel.15) [26], and the steering of roaming security
mechanisms are specified in 3GPP TS 33.501 [1]. Mechanisms to ensure message security
and integrity have been developed and can be found in 3GPP TS 31.115 Rel 15 [32].
This 5GS SOR solution does not preclude the use of the existing mechanisms for SOR as
defined earlier in this document. Implementation impacts are documented in GSMA PRD
IR.73 [5] and business guidelines in GSMA BA.30 [33].
Based on a geomap, a MNO can identify roaming partners and areas where changing the
policy from “grant service even without authentication confirmation” to “deny service unless
authentication confirmation is successful” would be a viable policy (i.e. would not lead to loss
of connectivity).
Operators could, in addition, measure the number of authentication events per roaming
partner per area and count how many of these events were performed with authentication
confirmation. Based on these statistics, potentially combined with other statistics from fraud
management data, the MNO could prioritise which areas to switch over to the new policy.
A further improvement in 5G is offered with the policing of incoming Location Updates with
the authentication confirmation messages.
Page 36 of 106
GSM Association Non-confidential
5G Security Guide
individual indications, the subscriber could be empowered to choose its own acceptable level
of privacy and exposure to fraud. Of course, in case of mandating SUCI-based identification,
the handset has to be compatible.
Operators could consider charging subscribers a premium for such security configuration
options. Depending on certain details, a business model-driven approach may be beneficial
or detrimental to the adoption of the underlying standard mechanisms.
GSMA could provide guidance and define a rule set with the goal to increase the adoption of
the security enabling technologies.
1. Legacy 4G UICC with USIM application – It is assumed that UEs can connect to a
5G network with a 4G USIM with its existing file structure and data settings. This would
imply the same authentication procedures as with 4G, with no use of SUCI.
The use of 4G SIMs is not excluded as this would otherwise imply costs and logistical
challenges that would result in significant service disruption if legacy 4G SIMs are
excluded. However, from a pure security perspective, the use of 4G legacy SIMs
does not take advantage of the 5G security enhancements, not least because the
SUCI enhancement will not work.
2. Updated 4G UICC with USIM application – In this case the SIM is updated over the
air with a new file structure and data settings. Then the UE can use the 5G security
procedures with the transfer of the SUCI encryption of the SUPI executed by the logic
within the UE.
This scenario depends on the ability of the SIM to be updated over the air with a new
file structure and data settings to support SUCI information storage.
3. 5G UICC with USIM application – The encryption of the SUPI is executed by the logic
inside the 5G UICC.
Mandatory replacement of SIMs is not desirable but, for specific use cases like
customers with heightened security needs (enterprises, governments, large accounts)
the replacement of SIMs might be needed to ensure that all 5G security capabilities
are realised.
For more details about the capabilities of IMSI/SUPI encryption in the 5G SIM or in the
device see a comparison in the report “Protecting Subscriber Privacy in 5G” by the Trusted
Connectivity Alliance [103].
From a security perspective, there is no difference between option 2 and option 3. The risk
only applies to the location in the UE where the calculation is performed as the SUPI needs
to be available outside the SIM for a key calculation. In the case of a compromised device, it
is likely the attacker also has access to the voice and data APIs.
Page 37 of 106
GSM Association Non-confidential
5G Security Guide
In 4G, the temporary identifiers may be visible. Malicious base stations may force the UE to
connect, and as a result, the SUPI will be visible. With the use of rotating master keys, the
impact of this risk can be limited.
An UICC card swap, (commonly referred to as a ‘SIM swamp’), involves cost and some
degree of service disruption so it may only be offered to customers looking for the enhanced
5G security benefits with integrity protection and the concealment of critical identifiers.
Connecting to 4G and 3G networks provides similar protection with support of the AKA
security protocol. However, security in 2G offers less protection and users are more easily
traceable.
The issue is recognised as is the need to consider use cases such as:
GSMA Device Security Group (DSG) advice is that users, and particularly those with
heightened security needs, should have the option to choose which radio technologies they
wish to access. This capability should be offered and controlled on the device. 3GPP TS
22.101 [51] already allows users and home operators to disable and re-enable a device’s
individual radio technologies. These features need to be implemented by device
manufacturers, in accordance with the standards, and should be made available to MNOs.
DSG recommended that MNOs should offer this configuration flexibility to their customers.
GSMA DSG does not consider it necessary to inform users, by default, when downgrading to
earlier radio technologies as to do so could cause confusion or unnecessary worry for most
users. Some technically savvy users that have higher security requirements may wish to be
informed and they should have visibility provided to them via menu choices on their devices
or via their enterprise device management system. This need could be fulfilled through a
specific application that uses an API offered by the device operating system.
Operators in most jurisdictions have a legal and regulatory obligation to allow unfettered
calling to emergency services. Because the UE should always be able to access emergency
services, regardless of the network connection and network/user decisions regarding which
radio technologies should be enabled, it must be possible to override the restriction settings
to ensure emergency service access is available. This override capability is provided for and
defined in 3GPP TS 22.101 [51][51].
Page 38 of 106
GSM Association Non-confidential
5G Security Guide
A ciphering indicator has been defined as a standardised feature in 3GPP TS 22.101 [51]
and it detects when radio interface ciphering (user plane) is not switched on and indicates
this to the user. This need can also be fulfilled through a specific application that uses an
API offered by the device operating system.
No specific network functions or provisioning actions are required by the network functions.
Device manufacturers are required to implement the requirements defined in 3GPP TS
22.101 [51] and implementations must be adequately secured. Device manufacturers should
provide MNOs the ability to provision security conscious users with the features described
above.
However, it should be ensured that the extra length of the SUCI should not cause backward
compatibility issues when interworking to older systems such as the RADIUS protocol,
where the length of the user name is limited to 256 octets.
This 256 octets size issue should not arise with the profiles specified thus far. These profiles
have a length less than 256 octets and longer profiles are only foreseen in the future. See
TS 33.501 [1] and TS 23.003 [50] for more details.
The steering is based on the HSS returning a R15 indicator to the MME, which then enables
the MME to modify the FQDN prior to the DNS query to obtain the address of the P-GW.
There is a concern that older MMEs do not understand the new R15 indicator and thus
anchor onto the (old) P-GW rather than the (overlay) SMF+P-GW. The proposal in [105]
describes the OI Replacement in NG.113 [58] as a basic selection mechanism to guarantee
that the mechanism works world-wide for all roaming use cases.
The increased home control feature is useful in preventing certain types of fraud but an
authentication protocol, by itself, cannot provide protection. The authentication result needs to
be linked to subsequent procedures in some way to achieve the desired protection.
Page 39 of 106
GSM Association Non-confidential
5G Security Guide
“Linking increased home control to subsequent procedures” in TS 33.501 [1] specifies the
details of the security enhancement for Home Control.
“Approach 1” and “Approach 2 – visited network in the second category” are equal in their
working.
ACCOLC/MTPAS can be applied in specific mobile cell sites prioritising access to mobile
networks for privileged persons (typically members of emergency services that are
designated at a local level). This allows/restricts devices of entitled users to gain priority
access to these cell sites. This only applies to the mobile devices of entitled users (e.g.
Police/Fire Services) that are equipped with a special SIM provisioned with specific Access
Class levels.
For 5G, the privileged access barring exceptions for Multimedia Priority Service (MPS) and
Mission Critical Services (MCS) are covered in the Unified Access Control (UAC) sections of
3GPP TS 24.501 [26] and 3GPP TS 38.331 [34].
Page 40 of 106
GSM Association Non-confidential
5G Security Guide
MCPTT: the Mission Critical Push To Talk as defined in 3GPP TS 22.179 [107]
MCVideo: the Mission Critical Video services as defined in 3GPP TS 22.281 [108]
MCData: the Mission Critical Data services as defined in 3GPP TS 22.282 [109].
Initially specified for LTE, these services have been further extended with additional features
and access capabilities in 5G. The mission critical services are typically developed for public
safety applications (police, fire and medical services), maritime safety applications and also
for general commercial applications (e.g., utility companies, railways and maritime usage).
Although roaming signaling traffic should be transferred in a network slice with high priority
and high quality of service, there may be an additional need to differentiate between sorts of
roaming traffic given that, more frequently, operators use partners’ networks for M2M and
IoT services. This may include services with very critical service characteristics that may
require a specific treatment to ensure the roaming traffic is rerouted via other resources.
As a result, 3GPP’s architecture group SA2 decided to move to the new Service Based
Architecture (SBA). That means all the Network Functions (NF) of the 5GC will be connected
via a service bus. For more details see the 5G architecture specification 3GPP TS 33.501 [1]
and in particular figure 4.2.4-1.
Page 41 of 106
GSM Association Non-confidential
5G Security Guide
3GGP CT3 and CT4 concluded on the use of standard Web protocols for the Service Based
Architecture (SBA) of 5GC for Release 15.
HTTP/2 (see IETF RFC 7540 [2]) as the application layer protocol
TLS (see IETF RFC 5216 [13]) to secure the communication between all NF inside a
PLMN
TCP (see IETF RFC 793 [3]) as the transport layer protocol
JSON (see IETF RFC 7159 [4]) as the serialisation protocol
To apply a RESTful framework for the APIs design whenever possible and use
custom methods otherwise;
To support notification with two HTTP client-server pairs;
The OpenAPI 3.0.0 as the Interface Definition Language.
Note: This diagram is for illustration purposes only. Strictly speaking there is no
Location Update message in 5G and, instead, the
Nudm_UECM_Registration is used to update the HPLMN about location
changes.
The secured communication between all NFs inside a PLMN is based on TLS with:
The details on the protocols assessment and conclusions can be found in the latest versions
of the 3GPP TS 23.501 [31][31] and 3GPP TS 33.501 [1].
As these protocols are used in the wider IT industry, it will likely lead to a shorter vulnerability
to exploitation timeline, and higher impact of vulnerabilities within these protocols with the
need for increased security patching, see also section 8.8. On the other hand, the use of
these well-known protocols expands out the potential pool of attackers. 4G and especially
Page 42 of 106
GSM Association Non-confidential
5G Security Guide
3G CNs benefit from attackers having little experience with the proprietary standards used
within them.
Vulnerability reporting schemes, such as the GSMA Coordinated Vulnerability Disclosure
(CVD) programme1, will have to manage the increased scope of these protocols. Once
located, the time to patch for relevant vulnerabilities should be short.
8.2 Intra-PLMN Signalling Message Flow within the SBA between NFs
As the SBA introduces TLS and APIs for inter-connectivity between the SBA functions, it will
require certificates to support TLS. The certificate allows for both (1) transport encryption
and (2) identity authentication.
The functions within the SBA can be created dynamically with virtualisation and resource
management tools. Hence the SBA will become a relatively dynamic environment, with
functions that may come in and out of existence and will need to be available to other
functions in the SBA over these encrypted channels. As a result, certificates (keys) will need
to be created dynamically and managed through their lifecycle, including archival storage.
As this is a difficult challenge, vendors are not proposing key management solutions for the
SBA and instead are proposing solutions that include a single (or few) certificates that have
wildcard identities. This allows the certificate to be used on any NF and reduces the
management overhead.
Although this simplified approach will support transport encryption between NFs, it will not be
able to validate that an endpoint is a legitimate one. This is a problem as MNO threat models
are more concerned with the ability for an attacker to create false functions (in this virtualised
core) than it is about having an attacker eavesdrop on data over transport.
To provide identity authentication between the NFs within a SBA, it is advised that the MNO
reuses, for this situation, the same key management procedure as specified for inter-PLMN
in FS.34 [53][53], see also the following section 8.3.
1 https://www.gsma.com/security/gsma-coordinated-vulnerability-disclosure-programme/
Page 43 of 106
GSM Association Non-confidential
5G Security Guide
SEPPs encrypt and sign all messages over N32-f using JOSE (JSON web signing
encryption)
Using JWE – JSON web encryption & signature (with symmetric key from TLS key
exchange)
The information transfer over the N32 interface needs to be encrypted as the N32 interface
is also used for e.g. the key renewal exchange with the SEAF.
The common application errors in Table 2, as defined in section 5.2.7.2 of 3GPP TS 29.500
[85][85], may also be used for the N32-c Handshake service.
Page 44 of 106
GSM Association Non-confidential
5G Security Guide
Page 45 of 106
GSM Association Non-confidential
5G Security Guide
Table 2 – Protocol and application errors common to several 5GC SBI API
specifications
The following application errors listed in Table 3 below are specific for the N32-c Handshake
service.
3GPP also improved, in Release 16, use of the internet protocols in the 5G core. In
particular, the error codes on the N32-f interface were improved and the following new codes
in Table 4 were introduced in section 6.1.5.3.7 of 3GPP TS 29.573 [86] to allow a finer
detection what kind of security error occurred.
Page 46 of 106
GSM Association Non-confidential
5G Security Guide
The specific set of GSMA guidelines for 5G Interconnect Security over the N32 interface is
contained in FS.36 [52][52] and the SEPP related aspects in FS.21 [17].
This also requires the implementation of the key management procedures as specified in
FS.34 [53]. This key management solution is generic for both LTE and 5G inter-PLMN
security.
Please refer to section 11 for inter-PLMN security details in interworking situations with both
Diameter and Signalling System Number 7 (SS7):
The security enhancements for LTE with Diameter are specified in FS.19 [9][9] and in
FS.21 [17].
A sketch of the security situation with interworking with Diameter and SS7 is further
explained in section 11 “Protection with Parallel Signalling technologies”.
The use of passive network taps or other means to retrieve a copy of the encrypted
signalling traffic will require that the monitoring system needs to be integrated with the
key management for the active elements on the SBA network.
The active elements on the SBA network supporting a data streaming facility to send
a copy of the signalling traffic to the monitoring system. This provides a cost-efficient
solution without the extra installation and operation costs for a separate tap network.
This simplified deployment model can be implemented either via network taps
integrated within the active elements on the SBA network or sending a copy of the
signalling traffic in a normalised data format as a feed to the monitoring system via a
standard API.
Page 47 of 106
GSM Association Non-confidential
5G Security Guide
Alternative solutions were also considered but come with their specific limitations and risks:
Note: The 3GPP standards only specify the working between single SEPP pairs
and don’t cover network situations with multiple SEPPs that will require
operational settings between roaming partners for the traffic distributed
across their edge nodes. This has a relationship with the key management
procedures in FS.34 [53] because use of a single key introduces the risk that
all interconnect points could be compromised if this key is stolen.
Alternatively, if every pair of SEPPs needs to be allocated a unique set of
keys that would introduce a cumbersome key management process.
8.8.1 Introduction
With the use of Internet protocols, and because governmental organisations perceive 5G as
a critical network and step change in national security risks due to increasing reliance on
mobile networks to support essential services, basic security weaknesses can no longer be
accepted.
Hence, there is an increased demand and need for security patching following the practices
and technologies applied for critical applications like banking with the use of Internet
Page 48 of 106
GSM Association Non-confidential
5G Security Guide
protocols. This specifically applies to the security patching of containers as this is very
different from the existing practices in 4G.
GSMA could be a conduit for equipment vendors to communicate the need for critical patch
updates to MNOs as general concerns persist about security patching with the IT protocol
stack and technology layering that is associated with virtualisation.
Note: For previous generation mobile systems, IR.77 [59][59] already includes in
Binding Security Requirement (BSR) 17 requirements in “Secure
Configuration of Network Elements, Network Services and IPX Services”.
The requirements in FS.25 [97] acknowledge changes to the global device landscape and
that increasingly varied hardware is making use of cellular connectivity. As a result, many of
the principles and methods outlined in this current version will be applicable to internet of
Things (IoT) and machine-to-machine (M2M) devices.
Page 49 of 106
GSM Association Non-confidential
5G Security Guide
Sharing of threat intelligence between MNOs aligns with the recommendations suggested by
EU ENISA and USA FCC in their reports [11] and [12], respectively.
In addition, this framework as defined in FS.21 [17][17] contains details on how information
could be shared, including via;
Threat intelligence integration is essential for the roll-out of 5GCs. As this is a new
technology for the telecommunication ecosystem, the industry, including the new verticals
that use 5G for their communication needs, does not yet know all of the attacks MNOs are
likely to face. Therefore, rapid integration of countermeasures against new attack scenarios,
based on latest threat intelligence information and analysis, is important to avoid having
outdated security protection and giving a false sense of security.
1. Mutual authentication for SBA APIs using both client and server-side certificates.
2. Use of OAuth for SBA API request authorisation and Logging of SBA API requests.
3. Use of load balancing and monitoring capabilities for SBA API requests.
Page 50 of 106
GSM Association Non-confidential
5G Security Guide
3. In addition, proactive threat hunting practices should be considered for all domains.
More elaborated descriptions of these additional security guidelines will be provided
in a future update of this document.
Page 51 of 106
GSM Association Non-confidential
5G Security Guide
OFF-net MO from,
ON-net MT to
SMSC
outbound roamer
MAP/
MAP/Diameter Diameter
Nsmsf Nudm
vSEPP N32 hSEPP
Namf
vAMF IPX
HPLMN
If the roaming interface is supported over Diameter End-to-End Security (DESS) [9], then
SMS roaming will be protected with integrity and confidentiality protection.
However, if the roaming interface is supported over Message Application Part (MAP)/SS7,
integrity or confidentiality protection will not be supported.
Ideally, SMSoNAS roaming in 5GS should be included within the scope of the SEPP
protection over the N32 interface. This will require the SMS roaming operations to be
supported over the Service-Based interface. This is being considered for Release-17 as
described in 3GPP TR 29.829 [74].
In the case of SMS over IP (SMSoIP) roaming in 5GS, for as long as the outbound roamer
continues to roam on IMS, the SMS messaging shall be protected over the UPF N9 Home-
Routed connection between the VPLMN and HPLMN, as shown in Figure 21. Otherwise, the
roamer’s SMS will fallback to SMSoNAS.
Page 52 of 106
GSM Association Non-confidential
5G Security Guide
HPLMN
(SMSoIP)
OFF-net MO from,
SMSC
ON-net MT to
outbound roamer
MAP/
MAP/Diameter Diameter
Nsmsf Nudm
vSEPP N32 hSEPP
Namf Nsmf
N4
N4
SIP
OFF-net MT to
home subscriber
MAP/Diameter
AMF UDM
FPLMN
Roaming Interface
(Domestic Interconnect
UE (R)AN will be direct)
Figure 22 – Inter-operator SMS for Domestic (direct) and International (direct or via
IPX) interworking
Consequently, inter-operator SMS in 5GS is not currently supported through the N32
interface and it will not benefit from the same level of protection that is offered by the SEPPs.
If SMS interworking is supported over Diameter End-to-End Security (DESS) [9], then such
inter-operator SMS shall be protected with integrity and confidentiality protection.
Page 53 of 106
GSM Association Non-confidential
5G Security Guide
However, if SMS interworking is supported over Message Application Part (MAP), which is
part of the SS7 protocol stack, no such integrity or confidentiality protection can be offered to
protect the privacy of the 5G subscriber.
Ideally, inter-operator SMS messaging in 5GS should also be included within the scope of
inter-PLMN security via the N32 interface, similar to the proposal for SMS roaming. This new
design will require 3GPP to consider applying the Service-Based interface for inter-operator
SMS, if applicable. This is being considered for Release-17 as described in 3GPP TR
29.829 [74].
Specifically in IR.65 [56], the originating and terminating service provider identities for RCS
interworking are described in the Session Initiation Protocol (SIP) headers. However, there is
currently no Inter-PLMN security specified for RCS interworking to support authentication,
integrity and confidentiality protection, similar to DESS or SEPP interworking. Therefore,
inter-operator RCS may be exposed to spoofing and the lack of privacy protection for 5G
networks and subscribers.
Ideally, inter-operator RCS messaging should also be included within the scope of 5G inter-
PLMN security. This may be supported via the 5GS interface for IP Multi-Media Subsystem
(IMS) interconnection and interworking. Otherwise, similar protection to DESS may need to
be defined.
In the FS.41 RCS fraud and security assessment [75], hop-by-hop hub authentication has
been recommended for the originating party to protect against spoofing. Additional security
design considerations shall be required to support integrity and confidentiality protection.
In addition, a side channel vulnerability that attackers may exploit for sending spoofed RCS
messages to targeted users is described in section 19.16.
Page 54 of 106
GSM Association Non-confidential
5G Security Guide
evolved voice systems leverage combined 5G core network elements along with IP
Multimedia Systems (IMS), VoLTE enhancements, 5G Evolved Packet Core (EPC) and
other 5G New Radio (5GNR) radio access network equipment, such as smart antennas.
1. VoLTE: When no 5G Core is deployed, the operator can rely on the underlying
VoLTE network including LTE Radio, EPC Core and IMS to deliver Voice for 5G
users while the 5G enhanced mobile broadband (eMBB) services are delivered
through 5G Radio and the enhanced LTE/EPC.
Advantages of Vo5G include ultra-high definition voice/audio for both voice-only calls as well
as integration with applications and content such as announcements, music, conferencing,
and more. Vo5G will also provide enhanced support for real-time communications including
Rich Communications Services (RCS) integration.
To secure the GTP traffic at the PLMN perimeter, the use of TLS, IPSec or similar is
recommended on the connections as well as adherence to the GTP-C security guidelines
described in GSMA PRD FS.20 [62] and the GTP-U security guidelines in GSMA PRD FS.37
[64].
For the user data traffic on the N6 interface to public network or private networks security
according to FS.37 [64] is recommended.
Page 55 of 106
GSM Association Non-confidential
5G Security Guide
transport layer security control recommended at the inter-PLMN border is Network Domain
Security/Internet Protocol (NDS/IP) by means of IPSec with peering partners.
The IPUPS functionality as shown at the network borders on the N9 interface in Figure 24 is
based on a principle of detect, correlate and filter incoming GTP-U user plane packets.
VPLMN HPLMN
The SMF controls the packet processing in UPF by establishing, modifying and deleting
Packet Forwarding Control Protocol (PFCP) session context on the N4 interface and
provisioning of various rules. As a result, the protection mechanism on N9 is controlled and
managed by the N4 interface between SMF and UPF. Three deployment models arise due
to the introduction of IPUPS functionality within UPF:
The UPF allocates and stores a local F-TEID during the PFCP association procedure on the
N4 interface per PDU session. This local F-TEID is the identifier for the user plane tunnel
that is unique per subscriber session. If the incoming GTP-U is destined for one these
tunnels identified by F-TEID, it is a valid packet. This detection mechanism relies on the
packet forwarding model defined in 3GPP TS 29.244 [83].
Page 56 of 106
GSM Association Non-confidential
5G Security Guide
PDR
PFCP
PFCP session’s PDR
Session look PDR look up
PDR MARs FARs QERs URRs
up (find
Packet In Packet Out
(find PFCP matching PDR
session with PDR of the Apply Instructions set in the
a matching PFCP session ...
matching PDR
PDR ) with highest
precedence)
The packet forwarding model performs PFCP session context lookup as outlined in Figure
25.
Each PFCP session context has a number of Packet Detection Rule (PDR).
Once the matching PFCP session context is found, the corresponding PDR is looked
up.
Each PDR has one or more identifiers to match against. F-TEID forms one of these
identifiers for outer IP packet matching for the incoming GTP-U packets.
The PDR screening stops screening as soon as first matched highest precedence PDR is
found. If the incoming GTP-U packets are received at the PLMN for the existing and
allocated F-TEID matched by the PDR, then GTP-U packets are permitted. Otherwise they
are dropped. The IPUPS functionality is defined in 3GPP TS 23.501 [31] and 3GPP TS
33.501 [1] and GSMA PRD FS.37 [64] describes the implementation in MNO networks, also
referenced in GSMA PRD NG.113 [58].
Diameter is positioned as a successor to SS7. Similar security risks apply to Diameter as for
SS7 as well as the end-to-end security risks due to topology hiding with the hop-by-hop
routing in Diameter Edge Agents (DEAs). The security vulnerabilities and the security
measures with Diameter are described in GSMA PRDs FS.19 [9] and IR.88 [10].
The combination of SS7 and Diameter requires special attention for the protection against
multi-domain attacks. This situation will be further complicated with the use of HTTP2 and
JSON for 5G. See FS.36 [52] for further details.
Page 57 of 106
GSM Association Non-confidential
5G Security Guide
This is especially the case when, in early NSA deployments, there will be a 5G NR combined
with existing 4G CN deployments like:
The risks from interworking with different technology generations and signalling protocols are
outlined in detail in FS.21 [17] and NG.113 [58].
In addition, for verticals which connect to 5G at the User Plane Function (UPF) or at the
Network Exposure Function (NEF) one has to consider the local service execution with
Software Defined Network (SDN) and Multi-access Edge Computing (MEC), which will
require a flexible and distributed security architecture and detailed information element
grained filtering.
As a result, all 5G and 5G + LTE scenarios should be protected. Figure 26 sketches the
multi-domain signalling coexistence assuming SS7 is interworked to HTTP2 via Diameter,
and reverse.
Page 58 of 106
GSM Association Non-confidential
5G Security Guide
Figure 27 sketches the protection capabilities with the various combinations of signalling
technologies.
The following protection capabilities are provided as part of the signalling protocol stacks for
the different roaming scenarios with the use of different signalling technologies:
As an illustration, Figure 28 shows in more detail the SA-based mobile roaming scenarios
with the best protection capability. This is with end-to-end supported confidentiality
protection (on top of authentication and integrity protection) by means of either a Digital
Signature (DESS Phase 2) or HTTP/2 per security perimeter segment. The diagram shows
that confidentiality protection can only be supported for a 5G UE when the device is end-to-
end controlled either by:
The 5G SA scenario with end-to-end HTTP/2 signalling support between SEPPs via
the N32 interface as specified in GSMA PRD FS.36 [52].
Page 59 of 106
GSM Association Non-confidential
5G Security Guide
The 5G NSA scenario with end-to-end DESS Phase 2 enhanced Diameter signalling
support between the DEA/SigFW border elements of the EPC networks as specified
in GSMA PRD FS.19 [9].
The less protected of the roaming scenarios apply when the roaming traffic is exchanged via
either the standard Diameter signalling (without the DESS enhancements) or via SS7
signalling. This is illustrated in Figure 29, and applies for the following roaming scenarios
with a 5G UE:
The 5G NSA scenario with the standard Diameter support between the DEA/SigFW
border elements of the EPC networks as specified in GSMA PRD FS.19 or by means
of the SS7 signalling as specified in GSMA PRD FS.11 [7].
When the 5G UE is paging in 2G or 3G because then the roaming is being supported
via SS7 signaling as specified in GSMA PRD FS.11 [7].
Note: Typically, SS7 is used for the 2G and 3G roaming scenarios. However, for
3G PS Diameter may also be used via the S6d interface.
GSMA PRD FS.21 [17] contains a complete overview of the other scenarios and the security
impact that is exposed via the network signaling with the existence of legacy technologies
Page 60 of 106
GSM Association Non-confidential
5G Security Guide
like 2G, 3G, 4G and 5G in combination with the coexistence of SS7, Diameter and HTTP/2
signaling protocol suites.
In addition, these threats are extensively addressed in the report “ENISA Threat Landscape
for 5G Networks – Updated threat assessment for the fifth generation of mobile
telecommunications networks (5G)” [60].
On the signalling firewall side, the SEPP has to work with 2G, 3G, 4G signalling firewalls as
the existence of legacy protocol suites and technologies offers an excellent opportunity for
hackers to build attack vectors with access via different signalling connections.
For 5G deployments with the NSA-based architecture, roaming traffic is handled between
4G CNs with the result that the security of the roaming traffic is via SS7 and/or Diameter
and, therefore, needs additional protection by screening functions and firewalls.
This effectively negates the security benefits of 5G signalling security and provides a legacy
attack vector, including 5G authentication confirmation, in which the home operator obtains
Page 61 of 106
GSM Association Non-confidential
5G Security Guide
strong cryptogaphic evidence that its customer is indeed roaming with the visited network as
the incoming signalling suggests.
In order to increase the level of security in situations where networks have SEPP, Diameter,
GTP-C and/or SS7 signalling links in parallel, it is appropriate for the home operator to ask
the question “is it reasonable that signalling for this customer arrives over this channel from
this partner?“. “Did we see an invalid request for another protocol for this customer?”
In this context, the home operator should be able to block incoming signalling on the basis of
the channel on which it arrives in combination with context information from other channels.
If, for example, a customer is 5G-roaming in B’s network for some time (business trip), then
the home network should be rejecting SS7 signalling from B for that customer – even if that
signalling appears to be legitimate with all other fraud detection systems in place.
There are certain tradeoffs between security, efficiency and connectivity. For example, some
geographic areas may only have 2G coverage by an otherwise 5G operator. In such cases
the home operator must be able to not cause connectivity issues for its customers. The
creation of false positives needs to be minimised and key security issues clearly identifiable
in a multi-protocol protection to avoid overloading the security team.
Certain user groups may have more strict security requirements, and may be happy to lose
connectivity if the signalling security level is too low. The subscription profile today allows
fine tuning of security e.g. Subscription-Data-Flags to push the security level higher for
sensitive customer groups. Another approach can be taken via the Policy Control Function
(PCF), but this is more in terms of QoS. The SEPP can in cooperation (to avoid bypassing)
with other signalling traffic filtering engines enforce user, user group or slice specific attack
countermeasures. In addition, the network itself needs to have sufficient support of the
security features offered by 5G e.g. deploying a real key for SUPI concealment.
With different network domains, products and business partnerships, the responsibility for
managing these different cloud environments falls to different organisations including
carriers, internet and cloud service providers, suppliers, and enterprises. For different cloud
service architectures (e.g., PaaS, IaaS), the shared operations responsibility model can
create additional security challenges.
Page 62 of 106
GSM Association Non-confidential
5G Security Guide
Initial Access – compromising user administration accounts that are not protected
by multi-factor authentication
Discovery – using open source tools to discover what cloud services are operating
and then disabling them in a later stage to avoid detection
Data Exfiltration – moving data from the customer’s production databases to the
hacker’s cloud service account or transferring the data out of the Communication
Service Provider (CSP) to the attacker’s private network
The document includes an extensive security chapter that examines multiple aspects of
security related to a single cloud infrastructure and security aspects for workloads. Future
work will address multi-cloud architctures.
In addition to describing high level security attack vectors, the document recommends cloud
infrastructure security requirements. Specifications and documents covering security
requirements and best practices published by standards organisations are also listed in a
dedicated section.
The document concludes with a consolidated set of essential and desired recommendations.
Operators are advised to carefully evaluate the recommendations for possible
implementation.
Page 63 of 106
GSM Association Non-confidential
5G Security Guide
Automation – there are critical activities that should be automated including cloud
security posture management, continuous security assessments, compliance
monitoring, detection of misconfigurations and identification and remediation of risks
Security Solutions – besides using the security services provided by cloud service
providers, the use of vetted third-party tools and services should be incorporated into
the overall security operations model
The standard provides extra security for sensitive functions down to individual Virtual
Machines. It introduces a trust hierarchy onto the flat admin architecture of public clouds so
that only a subset of telco engineers or processes can access these sensitive functions.
See for further explanation “ETSI Secure Public Clouds for Telcos” [36].
12.2 Virtualisation
In the virtualised world the threats can be more devastating than in the physical world. Those
threats could be propagated faster in a virtualised environment. Not only they can induce a
number of unknown damages, chain reactions and havoc, but also realise more effects than
in the physical environment.
Under the programmable network environment, NFV entities and SDN controllers differ from
the traditional bare-metal network elements by using network softwareisation and centralised
control of physical and virtual resources that expose them to the attack opportunities. As a
result of intruding the SDN, it might affect the physical and virtual resources, and the entire
network to the users i.e. tenants and end-users or consumers.
Page 64 of 106
GSM Association Non-confidential
5G Security Guide
The network must be designed to ensure its security, that of its users and their traffic against
cyber-attacks. Appropriate flexible security mechanisms may be applied.
5G is also intended to deliver an independent control of logical network slices and to provide
isolatable network resources for the tenants with their plethoric network services. 5G has a
series of isolation types, which must be integrated into the defence mechanism. These types
of isolation must be integrated when the end-to-end network slice and supporting network
infrastructure is being designed and implemented that can prevent attacks across tenants
and tenant's subscribers’ information.
Less visibility from Operating System (OS) to the guest Virtual Machines (VM) /
Containers with the Virtualisation or Containerisation
Its design shall secure the network, the users and traffic with flexible security
mechanisms
Page 65 of 106
GSM Association Non-confidential
5G Security Guide
container attack tools (e.g., Rhino Cloud Container Attack Tool) that facilitate different types
of attacks. The container security threats also include aspects such as compromised
container image file and registries, container management and orchestration functions,
container lifecycle management patches and updates, and container run time security, etc.
In order to facilitate the rollout of 5G networks and services, security technologies to address
these threats need to be considered in a timely manner.
For managing containers and microservices, Kubernetes and its associated infrastructure is
becoming a popular choice and it is also being integrated with the Continuous
Integration/Continuous Delivery (CI/CD) tooling and processes for deploying applications
and updates. There are many components of a Kubernetes infrastructure such as an API
server, Kube scheduler, and Kubernetes controller manager that need to be harderned. In
addition, Kubernetes functions need to be configured to restrict access to container image
repositories and clusters, enforce runtime policies (e.g., applications should not run as root),
and control ingress and egress communications to containers and microservices.
The OS like Linux via which access is given to application elements like UDM
The OS that is supporting the hypervisor
Hardware maintenance interfaces.
This is an unsolved technical issue not reflected in ETSI NFV standards or the 3GPP
standards. As a result, key material should be kept in a separate non-virtualised box.
For the storing of the authentication credentials encrypted in a secure hardware component
as in TS 33.501 [1], the HSM should be based on the following principles as in FS.43
“Security Guidelines for Storage of UICC Credentials” [90] like:
Unencrypted Ki must never exist outside of an HSM, neither for storage nor for
processing
A unique storage key must exist inside the HSM which will not be used for any
purpose other than encryption/decryption of Ki used by the Authentication Centre
EKi(store) to 5G vector calculation must take place inside a HSM
Page 66 of 106
GSM Association Non-confidential
5G Security Guide
Additionally, the support for multiple simultaneous algorithms in ETSI TS 103 457 “Trusted
Cross-Domain Interface: Interface to offload sensitive functions to a trusted domain” [35] like:
Security principles for Authentication in the HSM in ETSI TS 103 457 [35] like:
Ki must not be visible to the HSS/AUSF
Provisioning / transport / storage encryption keys must not be visible to the
HSS/AUSF
Authentication algorithms must not be visible to the HSS/AUSF
Keys and codes (such as OP code) must not be visible to the HSS/AUSF
Provisioning of HSM must be possible from a dedicated key management server
RAND calculation should take place using HSM random number generators
Rate limitation: possibility to limit the number of queries per IMSI to N/minute
Algorithm enforcement: HSM should not deliver COMP-128 vectors for a 3G/4G IMSI.
The need for implementation of a HSM in a virtualised software environment has been
affirmed by GSMA FASG. This is aligned with the guidelines in FS.43 “Security Guidelines
for Storage of UICC Credentials” [90].
In this context, ETSI TS 103 457 “Trusted Cross-Domain Interface: Interface to offload
sensitive functions to a trusted domain” [44] tackles the challenge of secure storage – where
organisations want to protect customer data whilst still using a cloud that is not under their
direct control.
Many organisations need to protect this data, but when it is held in a virtual network or cloud,
the organisation often doesn’t have control of this storage solution. TS 103 457 solves this
problem, by standardising an interface between a “secure vault” like HSM that is trusted and
a cloud that could be anywhere, where such sensitive data is stored in the vault. This allows
a sensitive function to exist in a lower security environment, with data held securely.
This new specification offers multiple use cases. For instance, this interface can be used
with new network function virtualisation (NFV) technology to allow secure authentication of
users for billing purposes. Virtualisation means that processing can happen anywhere and
might be untrusted, therefore these secure vaults are needed to protect sensitive functions
and data. This is more common as NFV technology becomes widespread.
The interface can also be used to search databases that hold private data. Another feature
defined in the specification is a logging function that allows queries of customer data to be
audited, making it easier to detect data breaches, which in turn deters malicious activity.
This ETSI standard proposes a new interoperable interface, so that an organisation may
change “vault” or cloud provider and still achieve the same functionality, which is vital in a
world of evolving technology.
Page 67 of 106
GSM Association Non-confidential
5G Security Guide
13 Network Slicing
13.1 Overview
Network slicing is defined in GSMA’s Future Networks document “An Introduction to Network
Slicing” [110][110] as “the embodiment of the concept of running multiple logical networks as
virtually independent business operations on a common physical infrastructure in an efficient
and economical way. This is a radical change of paradigm compared to current
implementations. With network slicing the 5G network is able to adapt to the external
environment rather than the other way around”.
Within a 3GPP system, TS 23.501 [31] and TS 28.530 [111] define the functions involved in
a Network Slice in a PLMN and shall include:
The 5G Core Network Control Plane and User Plane Network Functions.
The NG-RAN
The TWIF (Trusted WLAN Interworking Function) for trusted WLAN in the case of
support of N5CW devices
There are several key 5G Core functions that manage UE access to a network slice
A Network Slice instance can be associated with one or more S-NSSAIs, and an S-NSSAI
can be associated with one or more Network Slice instances and Multiple Network Slice
Page 68 of 106
GSM Association Non-confidential
5G Security Guide
instances associated with the same S-NSSAI may be deployed in the same or in different
Tracking Areas.
The operator can deploy multiple Network Slices delivering exactly the same features but for
different groups of UEs, and the network may serve a single UE with one or more Network
Slice instances simultaneously.
The Network Slice specific functions in the HPLMN are selected by the VPLMN via support
from the HPLMN NRF by using the related S-NSSAI.
When the UE moves from EPS to 5GS, the UE includes the S-NSSAIs associated with the
established PDN. The UE provides the AMF the S-NSSAIs values for the Serving PLMN
using the latest information from EPS and 5GS.
In the home-routed roaming scenario, the AMF selects the default V-SMFs. The PGW-
C+SMF sends PDU Session IDs and related S-NSSAIs to AMF.
The NSaaS offered by the operator can be characterized by certain properties e.g. radio
access technology, bandwidth, end-to-end latency, reliability, guaranteed / non-guaranteed
QoS, security level, etc.
Figure 30 illustrates some examples of how network slices can be utilised to deliver
communication services, including NSaaS.
Page 69 of 106
GSM Association Non-confidential
5G Security Guide
NS NS
NSaaS may impact the operator’s trust model and operational security. NSaaS may result in
reduced operational control and visibility. Operators should evaluate the risks resulting from
adopting this mode of operation and establish a clear shared responsibility model for the
services being offered in a similar manner to those offered by cloud service providers.
The NSSF may be configured with policies specifying conditions that would allow operators
to restrict S-NSSAIs per TA and per HPLMN of the UE.
In addition, the Home and Visited PLMNs can instruct the UE to never include the NSSAI in
the Access Stratum i.e. to always enable privacy for the NSSAI.
During the Registration procedure, the AMF may provide a NSSAI Inclusion Mode
parameter, indicating whether and when the UE shall include NSSAI information in the
Access Stratum Connection Establishment.
Page 70 of 106
GSM Association Non-confidential
5G Security Guide
The network operator can define some S-NSSAIs that would require additional Network
Slice Specific Authentication and Authorisation (NSSAA). The Network Slice-Specific
Authentication and Authorisation allows operators to further control access to a specific slice.
2. Primary Authentication
6. UE configuration update
The AMF invokes an EAP- based Network Slice-Specific authorisation procedure. This
procedure can be invoked for a supporting UE by an AMF at any time.
The SEAF/AMF performs the role of the EAP Authenticator and communicates with the
AAA-S via the NSSAAF. Multiple EAP methods are possible for NSSAA. A privacy-
protection capable EAP method is recommended, to protect the privacy of the EAP ID. The
AAA server can trigger Slice-Specific Re-authentication, Re-authorisation and Revocation
procedures as specified in TS 33.501 [1] providing continuous control over UE access to
specific authenticated and authorised slices. These can be used to prevent a compromised
UE from gaining further access to the slice.
3GPP recommends that at least one of the Subscribed S-NSSAIs marked as default S-
NSSAI should not require Slice-specific Authentication and Authorisation, in order to ensure
access to services even when Network Slice-specific Authentication and Authorisation fails.
Page 71 of 106
GSM Association Non-confidential
5G Security Guide
13. AAA Protocol message (EAP msg, AAA-S Addr., GPSI, S-NSSAI)
Network slices are logically independent dedicated networks that share a common network
infrastructure. To achieve high security and availability, 5G shall support isolation between
network slices by using physical and logical isolation methods. Figure 33 elucidates the end-
to-end isolation of the network slices in a 5G network.
Page 72 of 106
GSM Association Non-confidential
5G Security Guide
In this context, GSMA has defined security controls for network slicing in GSMA PRD FS.31
[63].
Figure 34 provides a high level overview of different isolation models, which operators may
use to satisfy the different requirements of vertical industries. Dedicated network
components may provide stronger isolation assurances at the expense of additional
complexity and cost while partly shared network components virtually isolated may satisfy
the majority of vertical industry use cases.
Page 73 of 106
GSM Association Non-confidential
5G Security Guide
communication
communication communication communication
services
service 1 service 2 service 3
network network
network
slice slice
slice
subnet B subnet C
subnet A
TN supporting
connectivity
A network slice may include non-3GPP parts e.g. data centre network (DCN), transport
network (TN), etc. The 3GPP management system has to coordinate with the non-3GPP
management system parts (e.g. MANO system) when preparing a network slice, as
illustrated in Figure 37 below.
Page 74 of 106
GSM Association Non-confidential
5G Security Guide
Manage TN
RAN Manage
COOR
CN
TN Mngt Sys
NSSMF provides the management services for one or more network slice subnets.
NSMF provides the management services for one or more network slices.
MDAF provides the Management Data Analytics Service for one or more NF, network
slice subnet and/or network slice.
Page 75 of 106
GSM Association Non-confidential
5G Security Guide
As each stage of slice lifecycle management may involve multiple 3GPP and non-3GPP
functions, operators should conduct detailed risk analysis and deploy adequate security
controls through the different network slice lifecycle phases. GSMA has developed content in
two of its PRDs FS.30 [113][113] and FS.31 [63][63] that can assist operators identify
relevant threats and recommended security and privacy controls.
Mutual authentication
If a management service consumer resides outside the 3GPP operator’s trust domain,
mutual authentication of the service consumer and producer using TLS 1.2 or 1.3 based on
either client and server certificates or pre-shared keys.
TLS 1.2 or above provides integrity protection, replay protection and confidentiality
protection for the interface between the management service producer and the management
service consumer residing outside the 3GPP operator’s trust domain.
After mutual authentication, the management service producer determines, based on either
OAuth token authorisation mechanism or local policy, whether the management service
consumer is authorised to send requests to the management service producer.
Page 76 of 106
GSM Association Non-confidential
5G Security Guide
SDN will help mobile operators shorten time-to-market for the new services hence
introducing a new business model to cater for the service requirements known as Network
as a Service (NaaS).
The concept can also be used in the RAN where the SDN controller could control and
schedule the radio resources for base stations, thus improving spectrum efficiency as well as
mobility management.
There are still many challenges with SDN that need to be addressed including the following:
3. Addressing security challenges for the communication between the control and data
planes.
4. Adoption of SDN into mobile networks, such as placement problem of SDN controller,
and mobility management.
Control plane: is the logically centralised network control platform having a global
view of the network resources and stats and provides hardware abstractions to the
applications in the application plane.
Infrastructure plane: also called the data plane that consists of the data forwarding
elements that act on the instructions of the control plane for dealing with the data
packets or traffic flows.
Page 77 of 106
GSM Association Non-confidential
5G Security Guide
The lack of visibility and controls on internal virtual networks coupled with the heterogeneity
of used devices make many Security Information and Event Management (SIEM)
applications ineffective. Existing SIEM solutions were mostly adapted and designed for
physical systems and boundaries.
With SDN, it is possible to create network monitoring applications that collect information
and make decisions based on a network-wide holistic view. This enables centralised event
correlation on the network controller and allows new ways of detecting and mitigating
security incidents.
Heterogeneity: analysis of different control and user plane traffic flows over the
network domains and new interfaces between Software Defined Mobile Networks
(SDMN) and existing networks and identification of related flows in different network
domains.
Page 78 of 106
GSM Association Non-confidential
5G Security Guide
A control layer based on SDN/SDM is inserted between the application and network
infrastructure layers. At the network infrastructure layer, an SDN protocol, such as
OpenFlow, is used as an interface.
SDN controller directs the network traffic to be analysed to the monitoring and Security
function. Such deployed rules on the security application will allow the identification of
anomalous traffic flows and the performance properties of the connection to provide “flow-
based visibility”.
See section 14.4.1, section 14.4.2 and Figure 42 for the added Modules and Interfaces of
the SDM architecture.
14.4.1 Modules
Security Sensor: an active monitoring probe for the detection of security and
behaviour related information (e.g. security properties and attacks) and mitigation
(e.g. filtering). It can be installed on the Network Elements on the application layer or
in network taps (passive network observation points) on the network infrastructure
layer.
SDM controller: a new module or extension of SDN controller to allow the control of
the monitoring function (i.e. management of network monitoring appliances, traffic
Page 79 of 106
GSM Association Non-confidential
5G Security Guide
mirroring, traffic load balancing and aggregation) and accept requests from network
functions and applications.
Monitoring and analysis Application: A monitoring function (i.e. part of the traffic
analysis)
Traffic Mirroring: a passive traffic monitoring device utilised by different network
functions.
14.4.2 Interfaces
SDN/SDM Control Interface: an interface that facilitates control the use of the
monitoring resources or metadata for analysis. It allows monitoring requests to be
performed and the status of the network linksto be obtained. In this way, applications
and network functions can send requests.
Page 80 of 106
GSM Association Non-confidential
5G Security Guide
The dramatic growth in the number of IoT devices requires all RAN deployments to
protect against the increasing likelihood of attacks by compromised devices.
Recognising the security challenges and criticality of a secure RAN, the O-RAN Alliance is
following the 3GPP security design practices of rigorous threat modelling and risk analysis.
In addition, the O-RAN management, Orchestration and Open Fronthaul M-plane interfaces
are protected using security best practices such as TLS and/or Secure Shell (SSH), mutual
authentication using X.509 certificates, access controls, robust logging and input validation.
The separation of O-RAN Distributed Unit (O-DU) and O-RAN Radio Unit (O-RU) introduces
a potential new attack surface in the RAN. The open fronthaul interface operating the lower
layer split (LLS) interface, and the threats to this interface will drive the security controls on
Page 81 of 106
GSM Association Non-confidential
5G Security Guide
the interactions between O-DU and O-RU, whereby security is key to delivering the benefits
of this separation.
O-RAN security is evolving to adopt modern security best practices. Table 5 provides a
partial view of the existing security controls and community’s progress.
For more details see the blog of the O-RAN Alliance “The O-RAN ALLIANCE Security Task
Group Tackles Security Challenges on All O-RAN Interfaces and Components” [93][93].
as middleware abstraction between the Commercial Off The Shelf (COTS) compute
layer and applications layer sitting on the top
re-used within vendor executable code with the executable code difficult to inspect.
Page 82 of 106
GSM Association Non-confidential
5G Security Guide
The whitepaper explains the differences between open interfaces and open source as these
lifecycles operate at different cycle times as well as both concepts requiring different actions.
In addition, the importance of layered security defences is outlined as well as broader
security considerations such as whole systems thinking, hybrid networks, holistic penetration
testing and threat & risk assessments. DevSecOps as a concept of ‘shifting left’ security
activities into earlier lifecycle phases to embed security through the lifecycle of a system is
also highlighted.
The following guidelines are provided for a secure deployment of OSS solutions:
Where vendor software includes open source components directly within code or is
included in a full stack supply, encourage vendors to update/patch upstream
components quickly or enable operators to act directly.
Exploit the strengths of open source transparency through code inspection, Source
Code Analysis (particularly to generate and validate an SBOM), dynamic application
security testing and encouraging use of coding standards through both vendor-
Software Development Life Cycles and Core Infrastructure Initiative.
Ensure that all open source components are supported by the community, industry
groups and/or the supplier for all OSS components included in all products.
Incorporate proven security methods that deliver ‘Bottom to top’ security to preserve
the root of trust for the solution as a whole. Current equipment is often supplied from
Page 83 of 106
GSM Association Non-confidential
5G Security Guide
a single vendor, open networking is changing this and may mean there are different
vendors involved in each layer.
The O-RAN Alliance Security Group is defining security requirements to align to the
specifications and interfaces. GSMA is keen to assist the O-RAN Security Group to
drive the maturity of security specifications that will build confidence for large scale
deployments. These are important security considerations that require
comprehensive design, feasibility and testing approaches that build maturity through
practical experience.
Consider the total operating environment into which open source code is deployed
such that holistic security outcomes are considered across both new and existing
infrastructures.
NESAS provides “out of the box” security assurance to MNOs and vendors, ensuring a
common baseline security level for the industry. In addition, NESAS can help vendors avert
fragmented regulatory and MNO customer requirements and give their networks a robust
security baseline. The security provided by NESAS can then be enhanced according to the
regional risk requirements and operator specific security needs e.g. due to high-risk
customer base, sensitive verticals or regulator requests.
Figure 45 illustrates the collaborative roles of 3GPP and GSMA within the scheme.
Page 84 of 106
GSM Association Non-confidential
5G Security Guide
The focus of NESAS is on equipment assurance. Although GSMA and 3GPP work on
security assurance in the wider sense, NESAS, does not address the following aspects;
Risk from legacy interworking, third party interworking or external systems (e.g. fixed
networks)
Security deployments (e.g. configuration, monitoring of traffic)
Operational security (e.g. threat analysis and threat intelligence feeds, penetration
testing of network, fraud protection)
Cloud security aspects (e.g. virtualisation and hosting security)
Operator organisational aspects (e.g. ISO 27 related aspects)
For many of these topics GSMA has created specifications and guidelines but they are not
part of the assurance program and need to be tailored to the individual operator ecosystem
and architecture.
In addition to the generic SCAS, requirements specific to different network product classes
are captured in separate documents and the following link provides a reference to the list of
3GPP specifications for the respective 5G network functions (AMF, UPF, UDM, SMF, AUSF,
SEPP, etc.): https://www.gsma.com/security/nesas-security-assurance-specifications/
Page 85 of 106
GSM Association Non-confidential
5G Security Guide
Considerations on 5G security
IPX securityaspects, such as IPX service provider usage and hop-by-hop routing and
security might become part of later 3GPP releases.
Concern was expressed that 5G signalling will incorporate the same vulnerabilities
as Diameter and the need for a new signalling architecture was noted.
5G will inevitably increase the attack surface resulting in an evolved threat landscape
and new technologies ,such as Network Function Virtualisation (NFV), are expected
to bring new security concerns.
SIP signalling has some known vulnerabilities that are potentially easier to exploit
than SS7 and Diameter.
5G will see break out from Diameter to use HTTP/2 as a base applicative layer and
that wil increase the number of interconnects, something attackers may use to their
advantage to slow down attack detection. Each interconnection must be properly
monitored.
Page 86 of 106
GSM Association Non-confidential
5G Security Guide
5G uses common “Internet” protocols like HTTP, TLS, and REST API for which
known vulnerabilities exist and these are often more quickly discovered and exploited
than was the case with older protocols.
Technical recommendations
The initial design of interconnect protocols has made security hard to implement but
an end-to-end security solution, providing both confidentiality and integrity is desirable
GSMA is studying ways to implement end-to-end interconnect security for LTE and
5G networks and to address operator concerns about interconnect security and the
need to eliminate legacy vulnerabilities. Simply upgrading network infrastructure is
not a solution to the problem.
In its report “Guideline on Security Measures under the EECC” [88][88], ENISA provides
guidance (“the framework”) to EU national authorities on the technical details of
implementing Articles 40 and 41 of the European Electronic Communications Code (EECC).
This is accompanied by the “5G Supplement to the Guideline on Security Measures under
the EECC” [94][94] that contains a 5G technology profile which supplements the technology-
neutral Guideline on Security Measures under the EECC.
The following diagram shows the relationship between both guidelines and their relationship
to the EECC and the EU Toolbox on 5G Security.
Figure 46 – Structure of the ENISA Guideline on Security Measures under the EECC
Page 87 of 106
GSM Association Non-confidential
5G Security Guide
A cybersecurity certification scheme for 5G will be developed in line with a February 2021
request by the European Commission to ENISA. The new cybersecurity certification scheme
follows on from the EU toolbox for 5G security to further enhance the cybersecurity of 5G
networks as it contributes to addressing certain risks, as part of a broader risk mitigation
strategy. The 5G scheme will be based on existing cybersecurity certification schemes as
well as experience already acquired by ENISA on cybersecurity certification.
SO 13: Use of encryption: Ensure adequate use of cryptographic controls for data
encryption to prevent and minimise the impact of security incidents on users and on
other networks and services.
SO 14: Protection of security critical data: Ensure that the security critical data is
adequately protected.
Hence, these guidelines are in line with the mandated use of encryption of all signaling in the
3GPP standards for 5G and they contain useful inights on the impact on network monitoring
and the storage of user credentials in a HSM.
In this document the criticality of the 5G assets is defined with both the Core network
functions and the NFV management and network orchestration (MANO) classified as
Critical, followed by the RAN classified as High, and the other 5G assets classified as
Moderate/High.
The 5G Technology profile gives additional and more specific guidance on 5G by clarifying
and refining the security measures for 5G networks and services.
Detailed analysis is made of the security impact of network virtualization, network slicing and
Edge computing.
Page 88 of 106
GSM Association Non-confidential
5G Security Guide
Support to Member States to defend their citizens and national security interests.
Working together on preventing, discouraging, deterring and responding to cyber
threats
The Joint Cyber Unit is a platform that will help to better protect the EU from the
most impactful cybersecurity attacks, especially cross-border ones.
The strategy comes with a continued focus on 5G security and related Toolbox – this has
testing and assurance within it.
The new Bill 216 will strengthen the security framework for technology used in 5G and full
fibre networks including the electronic equipment and software at phone mast sites and in
telephone exchanges which handle internet traffic and telephone calls.
It will also provide the Government with new national security powers to issue directions to
public telecoms providers in order to manage the risk of high risk vendors. While they are
already banned from the most sensitive ‘core’ parts of the network, the Bill will allow the
Government to impose controls on telecoms providers’ use of goods, services or facilities
supplied by high risk vendors.
Page 89 of 106
GSM Association Non-confidential
5G Security Guide
Given the breadth of these challenges, the DoD must collaborate closely with other U.S.
Departments and Agencies, industry, academia, Congress, allies, and partners to ensure
success.
5G technologies are strategic capabilities that will impact the U.S. economic and national
security and those of its allies and partners. The DoD can utilise its unique partnerships,
expertise, and resources to accelerate 5G innovation and deployment, including leading
edge millimetre-wave and spectrum sharing technologies in support of DoD’s enduring
missions. This will help ensure that the U.S. military, the American public, and its allies and
partners have access to the best 5G systems, services, and applications in the world.
18.1.3.3 FCC CSRIC WG2’s Report on Risks to 5G from Legacy Vulnerabilities and
Best Practices for Mitigation
The US FCC CSRIC Working Group 2 “Report on Risks to 5G from Legacy Vulnerabilities
and Best Practices for Mitigation” [67] focuses on security enhancements brought about by
5G NSA, device threat mitigation and changes in workforce skills and training. Because the
NSA architecture relies heavily on 4G infrastructure in the core, many of the vulnerabilities of
4G networks will exist in a 5G NSA deployment.
For the workforce, WG2 recommends that industry establish best practices for employee
training to address the transition to 5G SA highlighting the key activities that maintain carrier
grade reliability and security. This may include workforce training on cloud architecture,
network virtualisation and software defined networking, all of which are important
foundational aspects of 5G SA architecture.
For Control Channel Threats with 5G NR, WG2 recommends that the industry leverage the
flexible transmission capabilities of broadcast messages and signals. These technological
advancements should be leveraged to provide interference mitigation and resilience.
With respect to Threat Response Analysis, Academic Papers it concludes that previously
identified threats should continue to receive industry review and assessment. WG2
recommends higher layer security protections to mitigate user plane threats.
18.1.3.4 FCC CSRIC WG3’s report to Mitigate Security Risks to IP-based Protocols
The USA FCC CSRIC Working Group 3 report “Report on Best Practices and
Recommendations to Mitigate Security Risks to Current IP-based Protocols” [38] provides
recommendations to mitigate the security risks.
The report focuses on Domain Name Server (DNS) and Border Gateway Protocol (BGP) as
these protocols continue to evolve as the Internet continues to grow. Likewise, best practices
continue to evolve. There are new best practices being developed, and implementation of
existing measures such as the Resource Public Key Infrastructure (RPKI) continues.
Page 90 of 106
GSM Association Non-confidential
5G Security Guide
The recommendations in this report are of value in the context of the Secure Implementation
Guidelines with NESAS, as described in section17.1.
The same network functions found in 3G and 4G will also exist in 5G to support
roaming sessions.
HTTP2 is being introduced as a transport for JSON and RESTful protocols to support
5Gsignaling but legacy Diameter interfaces will remain.
QUIC is being considered to improve HTTP/2’s performance of connection-oriented
web applications currently over TCP by establishing a number of multiplexed
connections between two endpoints over the UDP transport protocol.
A pure 5G Core Network (i.e., 5GC) relies on HTTP2 interfaces, except for some
legacy interfaces.
Where the 5G radio terminates a Gateway (g)Nb into the existing 4G EPC, all of the
EPC diameter interfaces are maintained.
Most early 5G deployments will see the introduction of a new RAN and continued use
of the existing 4G core network with the result that Diameter will continue to be
supported for some time.
3GPP has defined 11 implementation models for 5G but with Release 15 only the
NSA-based options 3/3a/3x are being considered with a 4G LTE Core because many
of the CN functions are not defined by 3GPP with that release.
18.1.3.6 FCC CSRIC WG3’s and WG2’s Reports on Risks introduced by 3GPP
Releases 15 and 16 5G Standards and Recommendations
The US FCC CSRIC Working Group 3 “Report on Risks introduced by 3GPP Releases 15
and 16 5G Standards” [91] evaluates the 3GPP Releases 15 and 16 standards, identifies
areas of risk, and develops risk mitigation strategies to minimise risk in core 5G network
elements and architectures.
The report examines the security enhancements of 5G NR network and the 5GC network,
with a primary focus on the SA architecture. Several recommendations are given on how to
mitigate potential 5G security threats, as well as proposed future work. Additional work on
optional 5G features related to security and privacy will be the focus of a future WG3 report.
The FCC is advised to especially stimulate initiatives working on the framework for trusted
5G networks. To the industry, guidance is given on the following main topics:
Safegarding NF elements like UDM and SMSF against attacks via both HTTP and
via SS7/Diameter. The last due to interworking with 3G/4G networks and roaming by
what known attacks to HLR/HSS and MSC/VLR could be repeated in a 5G network.
To educate and train the workforce to operate and maintain carrier grade reliability
and security in a 5G SA environment including virtualization and network slicing.
Page 91 of 106
GSM Association Non-confidential
5G Security Guide
The use of open source and open interfaces with a key role for standards offers a
foundation and architecture for improving security in 5G provided that security is
addressed as a fundamental consideration of all open source architectures.
The US FCC CSRIC WG2 “Report on Review and Recommendations on Optional Security
Features in 3GPP Standards Impacting 5G Non-Standalone Architecture” [115][115]
identified and evaluated optional features that if not implemented could reduce the
effectiveness of 5G security and provided recommendations to address gaps. The primary
focus is on the 5G NSA architecture (Option 3) that leverages the 4G ePC to support 5G NR
and 4G capable devices and services. This report analyzed the 3GPP security specifications
that are labelled “mandatory to implement” and are “optional for carriers to deploy” for both
5G (3GPP TS 33.501 [1]) and 4G (TS 33.401 [116]). Security categories included in the
analysis included the following:
The primary recommendation is for carriers and operators to follow the guidance in previous
reports ([12], [38] and [67]) discussing risks and mitigation strategies when determining their
deployed security architecture. Additional recommendations included the continuation of the
FCC CSRIC 5G security initiative, addressing the 5G SA architecture and using best
practices as a reference when working with vendors and suppliers.
Page 92 of 106
GSM Association Non-confidential
5G Security Guide
18.1.3.7 DHS, CISA and S&T – Secure Mobile Network Infrastructure for Government
Communications
The US Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security
Agency (CISA) and Science and Technology Directorate (S&T) issued a Broad Agency
Annoucement (BAA) in 2019 that demanded new standards to improve the security and
resilience of critical mobile communications networks.
The BAA established a research and development (R&D) project for a Secure and Resilient
Mobile Network Infrastructure (SRMNI). The solicitation specifically seeked innovative
approaches and technologies to protect legacy, current and 5G mobile network
communications, services and equipment against all threats and vulnerabilities.The BAA, at
this time, has not been funded.
18.1.3.8 DHS and CISA - Overview of Risks Introduced by 5G Adoption in the United
States and 5G Wireless Networks: Market Penetration and Risk Factors
The report “Overview of Risks Introduced by 5G Adoption in the United States” [46] by the
Department of Homeland Security (DHS) / Cybersecurity and Infrastructure Security Agency
(CISA) assesses that the Fifth Generation Mobile Network (5G) will present opportunities
and challenges, and its implementation will introduce vulnerabilities related to supply chains,
deployment, network security, and the loss of competition and trusted options:
The CISA report is accompanied by the “5G Wireless Networks: Market Penetration and
Risk Factors” [47] providing an overview of the Mobile Network Equipment Components
Market Leaders and the Major Components of 5G Networking for User Equipment, Radio
Access Network (RAN) and CN.
Page 93 of 106
GSM Association Non-confidential
5G Security Guide
Threat - what will be the biggest changes to the threat landscape as a result of
5G rollout?
Cooperation - who are the new stakeholders MNOs will need to work with in
order to secure the rollout and use of future networks?
5G will play a crucial role in the operation of society – far more than 4G has done.
New networking and service models will therefore be required, including new trust
models.
A far wider range of stakeholders will need to consider the security implications of
their interfaces.
5G will also pose new concerns around privacy, identity management and
interoperability.
Page 94 of 106
GSM Association Non-confidential
5G Security Guide
Policies and Incentives - where are there good examples of incentivising the
secure rollout of 5G networks?
This is a major step for the implementation of the European Commission Recommendation
adopted in March 2019 to ensure a high level of cybersecurity of 5G networks across the EU
as 5G networks is the future backbone of our increasingly digitised economies and societies.
The report is based on the results of the national cybersecurity risk assessments by all EU
Member States. It identifies the main threats and threat actors, the most sensitive assets, the
main vulnerabilities (including technical ones and other types of vulnerabilities) and a
number of strategic risks.
key innovations in the 5G technology (which will also bring a number of specific
security improvements), in particular the important part of software and the wide
range of services and applications enabled by 5G;
the role of suppliers in building and operating 5G networks and the degree of
dependency on individual suppliers.
An increased exposure to attacks and more potential entry points for attackers.
Certain pieces of network equipment or functions are becoming more sensitive, such
as base stations or key technical management functions of the networks.
An increased exposure to risks related to the reliance of MNOs on suppliers that also
will lead to a higher number of attack paths.
The risk profile of individual suppliers will become particularly important.
Increased risks from major dependencies on suppliers.
Threats to availability and integrity of networks will become major security concerns.
Together, these challenges create a new security paradigm, making it necessary to reassess
the current policy and security framework applicable to the sector and its ecosystem and
essential for Member States to take the necessary mitigating measures.
In addition, the European Agency for Cybersecurity has published the report “ENISA Threat
Landscape for 5G Networks – Updated Threat assessment for the fifth generation of mobile
telecommunications networks (5G)” [60] that draws an initial threat landscape and presents
Page 95 of 106
GSM Association Non-confidential
5G Security Guide
In the updated version some additional elements have been taken into account to enlarge
the scope of the assessment and include important parts for the enhancement of operational
security:
2. Secondly, security issues of operational processes have been considered. These two
changes enlarge the scope of the assessment and include important parts for the
enhancement of operational security.
Following this ENISA report, the toolbox “Cybersecurity of 5G networks EU Toolbox of risk
mitigating measures” [61] was agreed by the NIS Cooperation Group. The objectives of this
toolbox are to identify a possible common set of measures which are able to mitigate the
main cybersecurity risks of 5G networks and to provide guidance for the selection of
measures which should be prioritised in mitigation plans at national and at EU level to create
a robust framework of measures with a view to ensure an adequate level of cybersecurity of
5G networks across the EU and coordinated approaches among Member States.
The measures contained in the EU Toolbox are based on the following 9 risks:
Subsequently, the Network and Information Systems (NIS) Directive issued the “Report on
Member States’ Progress in Implementing the EU Toolbox on 5G Cybersecurity” [87] that
provided an overview of the toolbox implementation process by as of June 2020 focussing
on the steps taken by EU Member States at national level.
A large majority of the EU states are in the process of significantly strengthening national
regulatory powers to regulate the procurement of network equipment and services by
operators, to perform more regular and detailed audits and to request more information from
operators about 5G equipment procurement and deployment plans. The implementation of
Page 96 of 106
GSM Association Non-confidential
5G Security Guide
the measures aimed at minimising the exposure to high-risk suppliers as well as to limit the
types of activity and conditions under which MNOs are able to outsource particular functions.
This provides an overview of the main Security Threats and Security Opportunities and is
being updated during their regular meetings.
In the IEC 62443 standard context, when the 5G network is part of a critical industrial
system, the administrators and 5G MNOs must be trusted by the industrial systems
operators. When security levels 3 and 4 are needed, higher layer protections (e.g. a secure
application layer protocol such as TLS or IPsec) may have to be provided.
The degree of involvement of the PLMN operator in implementation of the OT network plays
an important part in determining which security features apply. In an OT 5G Public Network-
Integrated Non-Public Network (PNI-NPN), where a PLMN operator provides part of the
network infrastructure or services, the PLMN operator is a new entity that the OT operator
must trust based on its certification requirements. As in any outsourcing model, visibility and
monitoring capabilities become key to establishing trust and verifying compliance. It has
been demonstrated that 5G security features form a toolbox that both OT and PLMN
operators can use to manage the risks in OT networks.
In this context, it is paramount that the system architecture ensures not only the principles of
security and privacy, but also those of deployability and practical operation. It constitutes a
call to action for all Vehicle-to-Everything (V2X) communication stakeholders to take these
into account when implementing credential management systems for V2X, and to future-
proof such systems against threats that may arise as connected cars become ubiquitous.
Page 97 of 106
GSM Association Non-confidential
5G Security Guide
are discussed to mitigate the threats, and various recommendations are proposed for
security enhancements.
The paper concludes that the new 5G architectures can expose new vulnerabilities. Securing
5G must be designed-in and not be an afterthought. Hence, a careful approach to these new
aspects of cloud-native services, open-source software, APIs, SDN and NFV can improve
their security. Taking a zero-trust approach, combined with advanced cyber threat
intelligence, will further enhance 5G’s security.
Security assurance considerations for the Software Supply Chain are also described in the
paper.
The report outlines attacks based on vulnerabilities in the HTTP/2 protocol and a MITM
attack relying on the packet forwarding control protocol (PFCP). Therefore, also in 5G
network it is vital to ensure comprehensive protection as operators frequently make errors in
equipment configurations with consequences for security. The important role played by
equipment vendors, which are responsible for the technical implementation of the
architected network protection features, is covered.
Protection of the 5G core must be thorough and far-reaching with additional systems for
monitoring, control, and filtering, in addition to regular security audits of the MNO network to
identify potential risks.
This white paper analyses the unique technical capability and service advantages of network
slicing services. Through the research and analysis of the key parameters and signaling
messages of network slicing, combined with the actual design capability of the current
system, the paper introduces the challenges faced by the characteristics of network slicing in
the design and technical implementation of the system. The paper introduces a variety of
reference architectures and technical design schemes for network slicing in devices and
proposes that 5G devices should support "the target scheme of network slicing in the
devices" and "modem centralization scheme", which provides guidance for 5G devices to
support network slicing capability.
Page 98 of 106
GSM Association Non-confidential
5G Security Guide
The paper explains how in 5G subscriber privacy is improved by encrypting the IMSI/SUPI to
mitigate the risk of IMSI Catchers. In addition, the capabilities of the options are compared
with encryption implemented in the 5G SIM or in the device. The paper also underlines that
an important balance is necessary between protecting a citizen’s right to privacy, and
ensuring that law enforcement agencies can track and monitor criminals.
19 5G Security Research
5G security has proven to be an attractive and fertile domain and area of focus for security
researchers. Government research agencies and a range of academic research papers and
other vulnerability disclosures have been published, revealed at security conferences and
otherwise made public.
1. Due to a lack of channel binding, KSEAF and SUPI could be confused between
concurrent sessions between HN (Home Network) and SN (Serving Network)
allowing attackers to bill other customers.
2. Attackers could impersonate a serving network towards a subscriber because implicit
authentication is deferred to use of keys.
3. Active attackers can trace a subscriber through use of the AKA protocol if the attacker
is, and stays, in the physical vicinity of the subscriber.
The first issue no longer exists because the 5G specifications evolved and SUPI and
K_SEAF, are now included in the same message. Consequently, confusion is no longer
possible and this vulnerability has been resolved.
The second issue is not considered a security oversight as a conscious decision was taken
during the standardisation process to bind the key delivered to the serving network to the
serving network identity to simplify the key hierarchy and to ensure legacy compatibility.
The third issue was considered to be only of moderate concern because authentication
involving SUPI encryption, with SUCI sent back to the home network decryption, only
happened on the rare occasions when a temporary identifier is not available, such as initial
attach to a new serving network. This was a design decision for efficiency reasons.
The researchers proposed radical reform of the authentication protocol, which was
considered impractical for reasons of backward compatibility. GSMA’s CVD Governance
Page 99 of 106
GSM Association Non-confidential
5G Security Guide
Team encourages operators to continue deploying the AKA protocol in their 5G core. Further
analysis of the research is contained in the GSMA’s briefing paper [20]:
19.2 On LTE Network Security Testing and Attack Detection Techniques with
Full Baseband Control (CVD-2018-0013)
The research paper “On LTE Network Security Testing and Attack Detection Techniques
with Full Baseband Control” [24] describes how insecurely configured LTE networks fail to
enforce the mandatory integrity protection on NAS and Radio Resource Control (RRC) can
allow attackers to launch a range of attacks including billing fraud.
Except for emergency calls, LTE networks must reject peers without integrity protection but
open source terminals could allow attackers to request insecure operation and a similar
issue exists in 5G. 3GPP TS 24.501 [26] was updated for 5GS NAS handling. Vendors
should check how their MME/AMF implementations react when receiving illegal input, and
apply appropriate error handling. Vendors are also advised to test the behaviour of non-
standards compliant devices.
A detailed assessment of the issues and the impact is available in a GSMA briefing paper
[25].
19.3 Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side
Channel Information (CVD-2018-0014)
The research paper “Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side
Channel Information” [21] describes an inherent design weakness of the 4G/5G cellular
paging protocol which can be exploited to achieve the following outcomes;
2. Determine a user’s IMSI (or SUPI for 5G) from the MSISDN or other identifiers
The attacks involve the attacker triggering paging messages to a target subscriber’s phone
and if enough are sent in quick succession it could be possible to observe on the radio
interface if the number of paging messages in a particular area increases, indicating the
presence of the target. The researchers observed that paging messages for any particular
device will only happen in specific timeslots, on a cycle that the attacker could observe, and
patterns could reveal when multiple paging messages are sent to the same device (even if
the temporary identifier (TMSI/GUTI) changes every time). A trial and error search of
encrypted SUPIs, using a false base station to send trial registration requests, possibly over
a long period of time that could render the attack impractical, could eventually reveal the
IMSI by analysing responses.
The GSMA Governance Team considered the research and concluded it was based on an
early version of 3GPP TS 38.304 [23]. The procedures had since been changed so that the
calculation of the Paging Frame Index (PFI) is no longer IMSI based but now uses 5G-S-
TMSI, which is strictly refreshed in 5G. Therefore, the attacks described in the paper do not
work and no remedial action is required.
The vulnerability arises from current 3GPP RRC specifications allowing the
UECapabilityEnquiry procedure to occur before RRC security establishment. This exposes
the UE capabilities to tampering by a man-in-the-middle attacker on the radio interface,
which can result in degradation of service e.g. downgrading the UE’s maximum throughput.
Since the UE capabilities are persistently stored in the network, the impact of the attack can
last for weeks, or until the UE is power cycled. Such attacks can have a particularly high
impact on unattended IoT devices. The researchers demonstrated the feasibility of the attack
using low cost equipment.
As there is no legitimate reason to fetch UE radio network capabilities before RRC security
establishment, GSMA requested 3GPP to change the specifications to prohibit the eNodeB
or gNodeB from running the UECapabilityEnquiry procedure before RRC security
establishment. The network should run the RRC UECapabilityEnquiry procedure only after
AS security has been activated so the vulnerabilities no longer exist.
19.5 New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols (CVD-
2019-0020)
The research paper “New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols” [27]
describes privacy threats by activity monitoring attacks. The paper addresses the risks with
the policies for the sequence number (SQN) of the AKA protocols in 3G and 4G and the
improvements with the asymmetric encryption of the SUPI in 5G.
Although the paper was not submitted to GSMA under its CVD programme, it was considered
when the research was made public. The claims in the paper are known security risks and no
need for further action was concluded.
LTEFuzz would remain useful for 5G NSA as long as open source LTE implementations
such as srsLTE support 5G in radio communication. Additional development would be
required to support 5G SA, as the CN is likely to change.
Although the paper was not submitted to the CVD programme, it was notified through a
GSMA member [29]. The claims in the paper are known security risks and no need for
further identified.
According to the impact assessment by the GSMA [40], this research is interesting from an
academic perspective and a known risk but no action was considered necessary.
A user traffic modification vulnerability exists because user traffic in LTE is encrypted but not
integrity protected. An integrity check allows both ends of a communication to detect if data
was modified in transit. This same attack applies to 5G as user-data integrity protection is
optional to use or only up to 64kbit/s data rates.
As a long-term solution for both LTE and 5G, GSMA in consultation with 3GPP, in a briefing
paper [71] advises MNOs to:
Ensure that newly purchased LTE/5G terminals and base stations support user plane
integrity protection to the fullest extent specified in the 3GPP standards
Assess the feasibility of a gradual upgrade of LTE/5G terminals and base stations in
the field to support full rate user plane integrity protection.
After detailed analysis, the GSMA Governance Team concluded the research was not new
and no specific action was required.
5GReasoner has identified 11 design weaknesses resulting in attacks having both security
and privacy implications and discovered 5 previous design weaknesses that 5G inherits from
4G and can be exploited to violate its security and privacy guarantees.
After detailed analysis of the scenarios, the GSMA Governance Team judged the scenarios
as nil or low impact in practice [55].
This allows the attacker to decode and listen to a targeted call, if the attacker 1) knows the
victim’s phone number, 2) can identify a specific call they wish to listen in to, 3) gets the UE
to answer an ‘attack’ call from the attacker while the victim remains connected to the same
cell, 4) records the same radio signals as the victim UE for the duration of the attack, and 5)
keeps the attack call going for the period of time they wish to listen in to the original call.
The following set of remedies are listed in the GSMA briefing paper [73]:
All eNB vendors need to check their products for potential keystream re-use and
develop a patch for affected network products.
3GPP standards need to be clearer that rekeying is required before bearer ID re-use.
For future 3GPP releases, to add defined UE behaviour when facing such eNBs.
The same attack technique could potentially be used to target other types of traffic sent via
the radio network, or similar calls in 5G networks, however these have not been assessed in
this research.
The GSMA Governance Team concluded the ‘SUCI-catching’ attack was considered to be of
academic interest but the ‘probing’ attack low-threat and low-impact and neatly summarised
in research paper “A Survey of Subscription Privacy on the 5G Radio Interface” [78]. Probing
is where an attacker already knows the subscription identity, e.g., an IMSI or an MSISDN
plus some associated information, and wants to find out whether the subscriber with this
identity is present in a given area. This is a far less powerful attack than a catching attack.
There are many possible ways to carry out such an attack, e.g., send a bunch of (if possible
silent) SMSs or other “activity triggers” to the MSISDN and see if there is a corresponding
flurry of signalling in the cell you are monitoring.
19.13 LTE/5G Downgrade Attack (CVD-2020-0034) and The Dos attack with
registration request and service reject (CVD-2020-0036)
By sending NAS messages without integrity protection, a rogue eNB/gNB can cause a UE to
not use a tracking area (TA) for a period of ~30-60 minutes. When carried out for all TAs in a
geographic area, the user will lose 4G/5G connectivity in that area (including the security
benefits) for the period, forcing the UE to connect to the less secure 3G/2G mobile systems.
The research also looks at a back-off timer for congestion being triggered within a UE by a
rogue base station that would cause a DoS for the user for 15 – 30 minutes. In case of
congestion, the network must be able to instruct UEs to back-off for a certain time without
increasing the network load by having to establish a security context first.
Both vulnerabilities are the result of a network design risk assessment whereby the protocol
design strikes a balance between potential limited DoS to individual users vs potential DoS
to the network.
However MEC 009 specifies the usage of OAuth token and TLS credentials for all APIs
(including MEC 014), and ETSI was requested to add a reference to MEC 014 to avoid
misunderstanding.
A similar situation may exist in the 5G network – and if 5G deployments support more carrier
aggregation in particular deployment setups, then the attack could be slightly more powerful.
insecure TCP connections between a victim UE and a Rich Communications Services (RCS)
server to send spoofed RCS messages to targeted users. This is not a flaw in 5G, nor a flaw
in RCS - it is about operator architectural decisions in TCP server deployments e.g. RCS
server deployment.
Mobile network operators should ensure that their RCS services are protected against IP-
spoofing attacks and operators should also update their risk analysis and mitigations to
include similar IP-spoofing attack vectors on other TCP-based services, specifically services
which are hosted externally and don’t natively use TLS / NDS security e.g. SIP-based SaaS
services.
It is our intention to provide a quality product for your use. If you find any errors or omissions,
please contact us with your comments. You may notify us at [email protected]