
Vulnerabilities in Private 5G/LTE: A Growing Threat Landscape

Private 5G/LTE networks are rapidly gaining popularity across various industries, offering enhanced connectivity, improved efficiency, and greater control over network infrastructure. However, as with any new technology, security concerns are emerging. Recent research has uncovered critical vulnerabilities in private 5G/LTE ecosystems, highlighting the need for robust security measures to protect these networks from increasingly sophisticated attacks.
Exploiting the 5G Core
Trend Micro’s research (ASN.1 Vulnerabilities in 5G Cores) reveals how attackers can exploit vulnerabilities within the 5G core network, the central component responsible for managing network functions and services. By sending malicious control messages disguised as user traffic, attackers can bypass security measures and gain access to sensitive information or disrupt network operations. This type of attack highlights the importance of securing the interface between the user plane (carrying user data) and the control plane (managing network functions).
Authentication Gaps in Cellular Packet Cores
Another study by Trend Micro (Vulnerabilities in Cellular Packet Cores – Part IV: Authentication) exposes vulnerabilities stemming from a lack of mandatory authentication between base stations and packet cores. This weakness allows attackers to exploit the network, potentially causing service outages and disrupting network operations. The research specifically identifies two vulnerabilities in Microsoft Azure Private 5G Core (AP5GC):
- CVE-2024-20685: This vulnerability can lead to potential service outages.
- ZDI-CAN-23960: Successful exploitation of this vulnerability can disrupt network operations.
These findings underscore the need for robust authentication mechanisms to verify the identity of devices and base stations attempting to connect to the core network.
Over-the-Air Attacks on 5G Modems
Researchers at Google (Over the Air, Under the Radar) delved into the security of the Pixel Modem, uncovering 122 vulnerabilities that could be exploited by attackers. These vulnerabilities highlight the potential for over-the-air attacks targeting 5G modems, enabling attackers to gain control of devices, intercept data, or launch further attacks on the network. This research emphasizes the importance of securing every component within the 5G ecosystem, including the modems embedded in user devices.
The Zero Trust Solution
Traditional security approaches that rely on perimeter-based defenses are no longer sufficient to protect against the evolving threat landscape targeting private 5G/LTE networks. A Zero Trust Network Access (ZTNA) model offers a more comprehensive and effective security solution by shifting the focus from implicit trust to explicit verification.
Here’s how ZTNA can help secure private 5G/LTE networks:
- Strong Identity Verification: ZTNA enforces strong authentication for every user and device attempting to access the network, regardless of their location. This prevents unauthorized access and helps to mitigate the risk of attackers impersonating legitimate users or devices.
- Least Privilege Access: ZTNA grants users and devices access only to the specific resources they need to perform their tasks. This limits the potential damage an attacker can cause even if they manage to gain access to the network.
- Continuous Authorization: ZTNA continuously monitors and evaluates the trust level of users and devices, revoking access if any suspicious activity is detected. This helps to contain the spread of an attack and minimize its impact.
- Microsegmentation: ZTNA enables the creation of microsegments within the network, isolating sensitive resources and applications from the rest of the network. This limits the lateral movement of attackers and prevents them from accessing critical systems.
- Encryption: ZTNA encrypts all traffic within the network, protecting sensitive data from interception and eavesdropping.
Why Choose OneLayer for Zero Trust Security?
OneLayer is a leading provider of Zero Trust security solutions specifically designed for private 5G/LTE networks. Our platform offers comprehensive visibility, automated threat prevention, and granular access control to secure your entire network infrastructure.
Here’s why OneLayer is the ideal choice for securing your private 5G/LTE environment:
- Purpose-built for Private Cellular Networks: Our solution is specifically designed to address the unique security challenges of private 5G/LTE networks, providing comprehensive protection for all devices and applications.
- Automated Threat Prevention: Our platform leverages advanced threat intelligence and machine learning to automatically detect and prevent malicious activity, minimizing the risk of attacks.
- Seamless Integration: OneLayer integrates seamlessly with your existing network infrastructure, simplifying deployment and management.
- Comprehensive Security: Our solution provides a holistic approach to security, addressing all aspects of the threat landscape, from device authentication to data encryption.
By choosing OneLayer, you can ensure the security and integrity of your private 5G/LTE network, enabling you to confidently embrace the benefits of this transformative technology.
Contact us today to learn more about how OneLayer can help you secure your private 5G/LTE environment.