Information disclosure - #VU17340

 

Information disclosure - #VU17340

Published: February 1, 2019


Vulnerability identifier: #VU17340
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: N/A
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor:
Affected software:

Detailed vulnerability description

The vulnerability allows a remote attacker to obtain potentially sensitive information

The vulnerability exists due to a weak state of in AKA (Authentication and Key Agreement). A remote attacker can create next-gen IMSI-catchers that work across all modern telephony protocols, reveal details about a user's mobile activity, such as the number of sent and received texts and calls, allowing IMSI-catcher operators to create profiles for each smartphone holder.

Furthermore, attackers can keep track of users, even when they move away from the fake base station (IMSI-catcher device), and later briefly return in the station's coverage, with the AKA protocol leaking updated phone activity states.

Remediation

The fixes will be completed by the end of 2019.

Sources