8 SS7 vulnerabilities you need to know about - Cellusys
8 SS7 vulnerabilities you need to know about - Cellusys
Wow, SS7 has been in the network controlling wire-line and wireless calls since the mid 1980s
and now we are talking about its vulnerabilities. A lot of people think we should only be focused
of the evolution to LTE/EPC Diameter based networks however; the legacy SS7 protocol based
networks serve the vast majority of wireless subscribers. Current indications are SS7 will be
around for quite some time and as such any vulnerabilities should be addressed immediately.
Before we can address these threats we must first understand them and how they are even
possible given the longevity of the network and protocol. The topic of discussion in this post will
be limited to those threats that are directly related to subscribers. Additional threats such as
denial of service against networks elements such as Mobile Switching Centers will be discussed in
subsequent posts.
In this discussion I will group these 8 threats into 4 broad categories so the impact to the
subscriber and ultimately the network operator can be easily determined. These categories are:
Note: In my of experience with the SS7 protocol and network, I have never seen
access to the network, technical protocol and network information, and protocol
message generation capabilities as easy and inexpensive to obtain.
Financial theft
Vulnerability 5. Intercepting a subscribers SMS (Text) Messages
The premise for this attack is — the intruder will pose as an MSC/VLR and send MAP-Update-
Location (UL) Request message directly to the subscribers HLR. Upon completion of this
procedure SMS messages will be sent to the intruder acting as a Fake MSC serving the target
subscriber. This attack can be used to obtain target subscribers passwords, reset passwords and
once the passwords are reset the intruder has Carte Blanche to the target subscribers accounts.
In this attack, the intruder poses as an HLR and sends a fraudulent subscriber profile to the
serving MSC/VLR invoking intruder desired services. These services can include:
Conclusion
As you can see by the examples provided in this blog – vulnerabilities and fraud within the SS7
protocol and network is a very serious issue. Some might say, “Let’s change the protocol and
network” — that cannot happen for many reasons as discussed. The solution to these protocol
and network issues is to place a security firewall into the network. This firewall should include the
policies required to address the current defined threats and be easily modified to address future
threats, as they are found. In order to accomplish these tasks the SS7 signaling firewall should
have real-time monitoring capabilities to help detect defined and future threats.
Cellusys and RoamsysNext Automate IR.21 Data Updates within Steering of Roaming System
October 6, 2023
Recent News
Flash calls: a new threat to MNOs
February 16, 2024
Products
Roaming
Signalling Security
Analytics
Services
Managed Security
Global Threat Intelligence
Penetration testing
Managed A2P SMS
Associate Member
© 2024 Cellusys All rights reserved
Privacy Policy