Newly Discovered LTE Vulnerabilities Could Allow Eavesdropping: Researchers

Advertisement
By Gadgets 360 Staff | Updated: 28 March 2019 14:10 IST
Highlights
  • LTE is widely used around the world and often marketed as 4G
  • LTE vulnerabilities could allow attackers to spoof SMS messages
  • Researchers used code-testing technique called “fuzzing”

LTE, although commonly marketed as 4G LTE, isn’t technically 4G

As LTE gets ready to make way for 5G, researchers have discovered several flaws in the Long-Term Evolution (LTE) standard, which could allow an attacker to intercept data traffic or spoof SMS messages. LTE, although commonly marketed as 4G LTE, isn't technically 4G, still it is widely used by the telecom operators around the world. LTE can be more accurately described as 3.95G. Given the widespread use of LTE, the latest findings have massive implications and clearly show wireless networks that consumers often take for granted aren't foolproof.

According to a report in ITPro, the researchers from Korea Advanced Institute of Science and Technology Constitution (KAIST) have found a total of 51 flaws in LTE, out of which 36 were previously undiscovered. They will be sharing detailed findings at a conference in May but for the time being they plan to share their research tool with telecom operators and device makers so that these vulnerabilities can be patched. Even though 5G is on the horizon, LTE is still the prominent cellular and data standard around the world.

The researchers discovered these flaws by using a code-testing technique called “fuzzing.” The vulnerabilities discovered by the South Korean researchers range from minor issues to severe flaws that could allow eavesdropping and data manipulation.

Advertisement

“These findings are categorised into five types: Improper handling of (1) unprotected initial procedure, (2) crafted plain requests, (3) messages with invalid integrity protection, (4) replayed messages, and (5) security procedure bypass,” the researchers wrote in a paper. “We confirmed those vulnerabilities by demonstrating proof-of-concept attacks against operational LTE networks. The impact of the attacks is to either deny LTE services to legitimate users, spoof SMS messages, or eavesdrop/manipulate user data traffic.”

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: LTE, 4G LTE, 5G, Long-Term Evolution
Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15R Confirmed to Come With 32-Megapixel Selfie Camera
  2. Supernatural Thriller Jatadhara Now Streaming on OTT: All the Details
  3. Apple Finally Releases iOS 26.2 Update for iPhone With These Features
  1. Kepler and TESS Discoveries Help Astronomers Confirm Over 6,000 Exoplanets Orbiting Other Stars
  2. Supernatural Thriller Jatadhara Arrives on OTT: Where to Watch Sonakashi Sinha-Starrer Film Online?
  3. OnePlus 15R Confirmed to Come With 32-Megapixel Selfie Camera, 4K Video Recording Support
  4. Rocket Lab Clears Final Tests for New 'Hungry Hippo' Fairing on Neutron Rocket
  5. Apple Rolls Out iOS 26.2 Update for iPhone With Liquid Glass Customisation, Changes to Apple Music, and More
  6. Aaromaley Now Streaming on JioHotstar: Everything You Need to Know About This Tamil Romantic-Comedy
  7. Astronomers Observe Star’s Wobbling Orbit, Confirming Einstein’s Frame-Dragging
  8. Galaxy Collisions Found to Activate Supermassive Black Holes, Euclid Data Shows
  9. JWST Detects Oldest Supernova Ever Seen, Linked to GRB 250314A
  10. Chandra’s New X-Ray Mapping Exposes the Invisible Engines Powering Galaxy Clusters
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.