Fill in the form and get a report on email

With new 5G networks, mobile operators face numerous challenges. One of them is the GTP protocol, used alongside SS7 and Diameter on core networks to transmit user and control traffic.

The problem for operators is that the GTP protocol can be exploited by attackers. Vulnerabilities leave the door open to denial of service and fraud.

To foresee GTP-related issues in the 5G context and outline preventive measures to ensure full 5G network protection, Positive Technologies has released its latest report on GTP security.

This is the concluding paper in our four-part research series on core vulnerabilities and threats in the mobile ecosystem. Operators can refer to it for a picture of GTP threats and expert recommendations on how to proactively counter fraud.

Stay ahead of the curve with knowledge and preparation. Download the «Threat vector: GTP. Vulnerabilities in LTE and 5G networks 2020» report now!