Zimperium Safety gaps in mobile phone antennas

Three critical ones in BTS stations allow hackers to compromise mobile phone antennas, according to Zimperium researchers.

"BTS" comes from the initials of the Base Transceiver Station and is the technical term used to describe the mobile antennas we see every day in our cities.Zimperium Base Transceiver Station

BTS stations are the backbone of every mobile network around the world and are used to relay calls, SMS and data packets from our mobiles to the data centers of the mobile phone companies, which in turn transmit the calls, SMS messages and data packets to their destination.

Zimperium security company, (which had discovered bug Stagefright), reports that there are three critical bugs in various software packages running on BTS stations.

Σύμφωνα με την Zimperium, επηρεάζονται που το λογισμικό τους περιλαμβάνει τα Legba Incorporated (YateBTS

Currently there seem to be three issues which mobile phone companies and BTS software should be addressed directly with their equipment.

The first is a bug in a BTS core software service that exposes the device to external connections, allowing an attacker to reach the BTS station transceiver over the Internet.

Attackers can send UDP packets to some managed ports (5700, 5701, 5701) and take advantage of the built-in device features. This allows the attacker to gain remote control of the BTS station, modify the GSM traffic, collect information from the passage of data, crash the BTS station, and more.

In this case, the Zimperium recommends companies shut down the ports used to control and exchange data using only the local interface (127.0.0.1), or to deploy a firewall to block external traffic.

The second issue is an overflow of memory caused by oversized UDP packages. It is a classic flaw that allows for remote code execution (RCE) that allows the attacker to run malicious code on the device. This error is as dangerous as the intruder's abilities.

The third error is related to the first. If the attacker can send UDB data at the BTS station, because the control channel does not have any authentication, it can also execute commands at the BTS station transceiver unit. The transceiver is the main component in the BTS station platform that sends and receives data.

This particular defect, according to Zimperium, allows an attacker to control the transceiver unit remotely, without having to have administrator passwords.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).