New 5Ghoul Attack Impacts 5G Phones with Qualcomm, MediaTek Chips
Cyber Security Threat Summary:
University researchers from Singapore have discovered a set of vulnerabilities in 5G modems produced by Qualcomm and MediaTek, which they are collectively calling 5Ghoul. These vulnerabilities impact 710 5G smartphone models from Android, Apple, various routers, and USB modems. The 14 vulnerabilities reside in mobile communication systems, 10 of which have been publicly disclosed and four withheld for security reasons. The 5Ghoul attacks range from temporary service disruptions to network downgrades, which may be more severe from a security standpoint.
The ten 5Ghoul vulnerabilities that have been publicly disclosed to Qualcomm and MediaTek as of December 7, 2023, are:
Security Officer Comments:
The researchers found the flaws during 5G modem firmware analysis, and report that the flaws are easy to exploit over-the-air by impersonating a legitimate 5G base station. This applies even when attackers lack information about the target's SIM card, as the attack occurs before the NAS authentication step. "The attacker only needs to impersonate the legitimate gNB using the known Cell Tower connection parameters (e.g., SSB ARFCN, Tracking Area Code, Physical Cell ID, Point A Frequency)."
According to the researchers, the DoS flaws in these vulnerabilities cause the devices to lose all connectivity until they are rebooted. This isn't as critical, although it can still have significant implications in mission-critical environments that rely on cellular service.
Suggested Correction(s):
Identifying all impacted models is ongoing, but the researchers have already confirmed that 714 smartphones from 24 brands are impacted. Some vulnerable brands include phones from POCO, Black, Lenovo, AGM, Google, TCL, Redmi, HTC, Microsoft, and Gigaset, with the complete list in the image below.
To learn more about the 5Ghoul flaws, their exploitation potential and ramifications, and technical information can be found in the researchers' whitepaper. A proof-of-concept (PoC) exploit kit can also be found in their GitHub repository.
Both Qualcomm and MediaTek released security bulletins on Monday for the disclosed 5Ghoul vulnerabilities,
The security updates were made available to device vendors two months ago. Still, given the complexity of the software supply, especially on Android, it will be a while before the fixes reach the end users via security updates.
Signs of a 5Ghoul attack include loss of 5G connections, inability to re-connect until the device is rebooted, and consistent drop to 4G despite the availability of a 5G network in the area.
Link(s):
https://www.bleepingcomputer.com/ne...pacts-5g-phones-with-qualcomm-mediatek-chips/
PDF(s):
https://asset-group.github.io/disclosures/5ghoul/5ghoul.pdf