srsRAN
1. Improper EMM state transition during authentication
In srsRAN, a spoofed Attach Request causes the network to transition the victim UE's EMM state to 'deregistered,' even before authentication completes. If authentication fails, the state is not restored, leading to a persistent mismatch between the network and the victim UE (still in CONN. or IDLE). This inconsistency results in connection failures or rejected Service Request.
2. Security context manipulation during GUTI attach
Our analysis identified a vulnerability where an attacker can use a victim's GUTI to send spoofed Attach Request messages, causing the victim's security context (including security keys) to be modified without proper validation. When the network receives a GUTI-based Attach Request, it processes the UE as previously attached and initiates authentication procedures. During this process, the security context is altered but is not properly restored if authentication fails. This results in a persistent key mismatch between the victim UE and the network, rendering the victim incapable of accessing network services due to key verification failures in subsequent communications.
3. NAS context deletion during IMSI attach
We discovered that when an attacker sends an Attach Request using a victim's IMSI, the network incorrectly deletes the victim's previous NAS context. Upon receiving an IMSI-based Attach Request for a known user, the network immediately deletes the existing context associated with that identity. When the legitimate victim UE later attempts to connect using a GUTI-based attach, integrity verification fails due to the deleted context, forcing a complete re-authentication.
4. No update of UE network capability during GUTI attach
A significant vulnerability exists in how UE network capabilities are handled during attach procedures. We found that the network fails to update the UE network capabilities when processing a GUTI-based Attach Request. When a legitimate victim UE performs a GUTI attach, the system does not read or process the network capabilities from the UE's attach message. Instead, it continues to use previously stored values. If an attacker had earlier used the victim's IMSI to send a spoofed Attach Request with modified network capabilities, the network maintains these attacker-supplied values rather than updating them from the legitimate UE's message. This leads the network to send Security Mode Command messages with incorrect capabilities, leading the victim UE to detect the mismatch and reject the security mode command. This implementation flaw allows an attacker to manipulate security algorithm negotiation, causing service disruption through security verification failures.
5. NAS context reset when processing Service Request with invalid MAC
We identified a vulnerability in the handling of Service Request messages with invalid short MAC values. When the network receives such a message, instead of simply rejecting it, the network resets the UE's NAS context, including critical state information such as the EMM state. When the legitimate victim UE later sends a Service Request, the network responds that the UE is not registered and sends a Service Reject with an "implicitly detach" cause. This allows an attacker to remotely deregister any UE from the network by simply sending a Service Request with the victim's identity and an invalid MAC, causing significant service disruption without any indication to the legitimate user.