Daily Security Review
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
19 Aug 2025
A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and inject malicious messages during the unencrypted pre-authentication phase of a device’s 5G connection. This early handshake phase, often triggered by common reconnections, opens a brief but dangerous window of opportunity for attackers.Through this vector, researchers proved that attackers can:Crash the device’s modem, rendering it temporarily unusable.Track devices, undermining 5G’s promise of improved subscriber privacy.Force downgrades to 4G, reintroducing older vulnerabilities and enabling known exploitation techniques such as replay-based bidding-down attacks.Unlike previous 5G attack demonstrations, which often relied on fake base stations, Sni5Gect operates with off-the-shelf software-defined radios (SDRs) as a passive third party—making the attack far more accessible. Tested against multiple commercial smartphones, the framework achieved high success rates, underscoring the severity of the threat. Its release as an open-source project highlights both its value for research and its potential misuse by adversaries.The GSMA has acknowledged these findings, emphasizing the importance of continuous improvement in 5G security standards and industry defenses. This discovery follows growing concerns about legacy network coexistence and multi-protocol attack vectors, as devices frequently switch between 5G, 4G, and even older standards.Sni5Gect’s implications are profound: it exposes a structural weakness in the design of 5G’s initial connection process, raising questions about whether the push toward zero trust and stronger encryption has adequately addressed this early-stage exposure. Security experts warn that similar techniques could evolve into scalable attacks against critical infrastructure, IoT ecosystems, and enterprise mobility.For mobile operators and enterprises alike, the takeaway is clear: 5G’s enhanced security features only deliver on their promise if consistently implemented, monitored, and hardened against emerging threats. Research like Sni5Gect is a reminder that attackers are always one step behind the protocol designers—and sometimes, one step ahead.#5Gsecurity #Sni5Gect #GSMA #telecomsecurity #preauthentication #modemdowngrade #connectiondowngrade #4Gsecurity #zeroTrust #5Gvulnerabilities #telecomresearch #networksecurity
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
13:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
10:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
13:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana