Successfully deploying 5G networks around the globe and delivering the functionality customers expect will create security challenges for mobile network operators. The 5G Standalone core has not been explored by security research—until now. Our security experts dived into the 5G Standalone core and uncovered how cybercriminals can exploit vulnerable configuration components, breach the 5G architecture, and pull off DoS attacks.
Positive Technologies presents to you the first-ever published security research on the 5G Standalone core. Read to learn about major vulnerabilities affecting it. This research incorporates the results of network architecture analysis plus an overview of subscriber authentication and how network elements interact.