Home > CAPEC List > CAPEC-617: Cellular Rogue Base Station (Version 2.11)  

CAPEC-617: Cellular Rogue Base Station

Cellular Rogue Base Station
Definition in a New Window Definition in a New Window
Attack Pattern ID: 617
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

In this attack scenario, the attacker imitates a cellular base station with his own “rogue” base station equipment. Since cellular devices connect to whatever station has the strongest signal, the attacker can easily convince a targeted cellular device (e.g. the retransmission device) to talk to the rogue base station.

+ Attack Prerequisites
  • None

+ Typical Severity


+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: Low

This technique has been demonstrated by amateur hackers and commercial tools and open source projects are available to automate the attack.

+ Solutions and Mitigations

Passively monitor cellular network connection for real-time threat detection and logging for manual review.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Read application data
Intercept and control cellular data communications to/from mobile device.
+ Technical Context
Architectural Paradigms
+ Content History
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017