Home > CAPEC List > CAPEC-606: Weakening of Cellular Encryption (Version 2.9)  

CAPEC-606: Weakening of Cellular Encryption

 
Weakening of Cellular Encryption
Definition in a New Window Definition in a New Window
Attack Pattern ID: 606
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker, with control of a Cellular Rogue Base Station or through cooperation with a Malicious Mobile Network Operator can force the mobile device (e.g., the retransmission device) to use no encryption (A5/0 mode) or to use easily breakable encryption (A5/1 or A5/2 mode).

+ Attack Prerequisites
  • Cellular devices that allow negotiating security modes to facilitate backwards compatibility and roaming on legacy networks.

+ Typical Severity

High

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: Medium

Adversaries can purchase and implement rogue BTS stations at a cost effective rate, and can push a mobile device to downgrade to a non-secure cellular protocol like 2G over GSM or CDMA.

+ Solutions and Mitigations

Use of hardened baseband firmware on retransmission device to detect and prevent the use of weak cellular encryption.

Monitor cellular RF interface to detect the usage of weaker-than-expected cellular encryption.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Other
Tracking, Network Reconnaissance
+ Technical Context
Architectural Paradigms
Mobile
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: December 07, 2015