Unmasking the Vulnerable: Major 5G Modem Flaws Discovered by ASSET Researchers

In a disturbing revelation, researchers have recently discovered a set of 14 major vulnerabilities in the 5G modems of numerous smartphones, raising significant concerns regarding the security of these devices. These vulnerabilities not only have the potential to compromise user safety but also enable attackers to launch devastating Distributed Denial of Service (DDoS) attacks. These findings have far-reaching implications as they affect a staggering 714 smartphone models from 24 different manufacturers.

Scope of the vulnerabilities

The scale and reach of these vulnerabilities is astonishing. The affected smartphones span across renowned brands such as Samsung, Apple, Google, Huawei, Xiaomi, OnePlus, and Honor, to name a few. This widespread influence places the security and privacy of millions of users at risk.

Impacted smartphone brands

Leading smartphone manufacturers such as Samsung, Apple, Google, Huawei, Xiaomi, OnePlus, and Honor are among the numerous brands affected by the recently discovered 5G modem vulnerabilities. This raises concerns about the security assurance provided by these widely trusted brands, as their devices are now susceptible to potential attacks.

To shed light on the severity of these vulnerabilities, researchers have aptly named the group “5Ghoul,” signifying the haunting consequences these flaws can unleash upon smartphone users. By voluntarily naming the vulnerabilities, researchers aim to increase awareness and prompt remedial actions in the industry.

The identified security flaws present numerous opportunities for potential attackers. Notably, remote DDoS attacks can be executed without the need for the attacker to possess any secret information or SIM card details. By impersonating a legitimate gNB (next-generation NodeB), attackers can manipulate known connection parameters to effectively disconnect devices from a network, causing significant disruption.

Actions taken by Qualcomm and Mediatek

In response to these alarming discoveries, chipset manufacturers Qualcomm and Mediatek have swiftly taken action. Both companies have released patches for 12 out of the 14 identified vulnerabilities. These patches aim to address the security flaws and safeguard smartphone devices from potential attacks.

Challenges in implementing security patches

Despite the proactive response from Qualcomm and MediaTek, implementing security patches for 5G modems poses a significant challenge. Researchers caution that it usually takes six months or even longer for these critical security updates to reach end users. This extended timeframe raises concerns regarding the vulnerability exposure window and users’ potential susceptibility during this period.

Concerns regarding 5G smartphone security

The discovery of these vulnerabilities sheds light on the urgent need for enhanced security measures in smartphones equipped with 5G modems. As 5G technology continues to proliferate, ensuring the integrity of these devices and protecting user data becomes paramount. The existence of these flaws serves as a wake-up call for smartphone manufacturers, emphasizing the need for robust security protocols throughout the product lifecycle.

Urgency for smartphone manufacturers

Given the gravity of the situation, smartphone manufacturers are urged to address the vulnerabilities promptly. By acknowledging the risks posed to users and taking immediate action, manufacturers can mitigate potential harm caused by malicious actors. Promptly deploying patches and ensuring their widespread availability will protect users from potential DDoS attacks and contribute to fortifying the overall security posture of smartphones.

The recent discoveries of major vulnerabilities in 5G modems used in a wide range of smartphone models highlight critical security risks and vulnerabilities faced by consumers. The scale and reach of these vulnerabilities, affecting trusted brands and millions of users, cannot be ignored. It is imperative for manufacturers to prioritize swift action in developing and deploying patches to protect their users and close the security gaps in these 5G modems. Ensuring the security and privacy of smartphones is crucial to maintain user trust and safeguard sensitive data in an increasingly interconnected world.

Explore more

AI Redefines Software Engineering as Manual Coding Fades

The rhythmic clacking of mechanical keyboards, once the heartbeat of Silicon Valley innovation, is rapidly being replaced by the silent, instantaneous pulse of automated script generation. For decades, the ability to hand-write complex logic in languages like Python, Java, or C++ served as the ultimate gatekeeper to a world of prestige and high compensation. Today, that gate is being dismantled

Is Writing Code Becoming Obsolete in the Age of AI?

The 3,000-Developer Question: What Happens When the Keyboard Goes Quiet? The rhythmic tapping of mechanical keyboards that once echoed through every software engineering hub has gradually faded into a thoughtful silence as the industry pivots toward autonomous systems. This transformation was the focal point of a recent gathering of over 3,000 developers who sought to define their roles in a

Skills-Based Hiring Ends the Self-Inflicted Talent Crisis

The persistent disconnect between a company’s inability to fill open roles and the record-breaking volume of incoming applications suggests that modern recruitment has become its own worst enemy. While 65% of HR leaders believe the hiring power dynamic has finally shifted back in their favor, a staggering 62% simultaneously claim they are trapped in a persistent talent crisis. This paradox

AI and Gen Z Are Redefining the Entry-Level Job Market

The silent hum of a server rack now performs the tasks once reserved for the bright-eyed college graduate clutching a fresh diploma and a stack of business cards. This mechanical evolution represents a fundamental dismantling of the traditional corporate hierarchy, where the entry-level role served as a primary training ground for future leaders. As of 2026, the concept of “paying

How Can Recruiters Shift From Attraction to Seduction?

The traditional recruitment funnel has transformed into a complex psychological maze where simply posting a vacancy no longer guarantees a single qualified applicant. Talent acquisition teams now face a reality where the once-reliable job boards remain silent, reflecting a fundamental shift in how professionals view career mobility. This quietude signifies the end of a passive era, as the modern talent