Attackers can exploit vulnerabilities in 5G networks to steal subscriber data

  • by

Positive Technologies has published its “5G standalone core security assessment”. The report discusses vulnerabilities and threats for subscribers and mobile network operators, which stem from the use of new standalone 5G network cores. The vulnerabilities in protocols HTTP/2 and PFCP, used by standalone 5G networks, include the theft of subscriber profile data, impersonation attacks and faking subscriber authentication.

The post Attackers can exploit vulnerabilities in 5G networks to steal subscriber data appeared first on IoT Now – How to run an IoT enabled business.

Leave a Reply

Your email address will not be published. Required fields are marked *