Unmasking the Vulnerable: Major 5G Modem Flaws Discovered by ASSET Researchers

In a disturbing revelation, researchers have recently discovered a set of 14 major vulnerabilities in the 5G modems of numerous smartphones, raising significant concerns regarding the security of these devices. These vulnerabilities not only have the potential to compromise user safety but also enable attackers to launch devastating Distributed Denial of Service (DDoS) attacks. These findings have far-reaching implications as they affect a staggering 714 smartphone models from 24 different manufacturers.

Scope of the vulnerabilities

The scale and reach of these vulnerabilities is astonishing. The affected smartphones span across renowned brands such as Samsung, Apple, Google, Huawei, Xiaomi, OnePlus, and Honor, to name a few. This widespread influence places the security and privacy of millions of users at risk.

Impacted smartphone brands

Leading smartphone manufacturers such as Samsung, Apple, Google, Huawei, Xiaomi, OnePlus, and Honor are among the numerous brands affected by the recently discovered 5G modem vulnerabilities. This raises concerns about the security assurance provided by these widely trusted brands, as their devices are now susceptible to potential attacks.

To shed light on the severity of these vulnerabilities, researchers have aptly named the group “5Ghoul,” signifying the haunting consequences these flaws can unleash upon smartphone users. By voluntarily naming the vulnerabilities, researchers aim to increase awareness and prompt remedial actions in the industry.

The identified security flaws present numerous opportunities for potential attackers. Notably, remote DDoS attacks can be executed without the need for the attacker to possess any secret information or SIM card details. By impersonating a legitimate gNB (next-generation NodeB), attackers can manipulate known connection parameters to effectively disconnect devices from a network, causing significant disruption.

Actions taken by Qualcomm and Mediatek

In response to these alarming discoveries, chipset manufacturers Qualcomm and Mediatek have swiftly taken action. Both companies have released patches for 12 out of the 14 identified vulnerabilities. These patches aim to address the security flaws and safeguard smartphone devices from potential attacks.

Challenges in implementing security patches

Despite the proactive response from Qualcomm and MediaTek, implementing security patches for 5G modems poses a significant challenge. Researchers caution that it usually takes six months or even longer for these critical security updates to reach end users. This extended timeframe raises concerns regarding the vulnerability exposure window and users’ potential susceptibility during this period.

Concerns regarding 5G smartphone security

The discovery of these vulnerabilities sheds light on the urgent need for enhanced security measures in smartphones equipped with 5G modems. As 5G technology continues to proliferate, ensuring the integrity of these devices and protecting user data becomes paramount. The existence of these flaws serves as a wake-up call for smartphone manufacturers, emphasizing the need for robust security protocols throughout the product lifecycle.

Urgency for smartphone manufacturers

Given the gravity of the situation, smartphone manufacturers are urged to address the vulnerabilities promptly. By acknowledging the risks posed to users and taking immediate action, manufacturers can mitigate potential harm caused by malicious actors. Promptly deploying patches and ensuring their widespread availability will protect users from potential DDoS attacks and contribute to fortifying the overall security posture of smartphones.

The recent discoveries of major vulnerabilities in 5G modems used in a wide range of smartphone models highlight critical security risks and vulnerabilities faced by consumers. The scale and reach of these vulnerabilities, affecting trusted brands and millions of users, cannot be ignored. It is imperative for manufacturers to prioritize swift action in developing and deploying patches to protect their users and close the security gaps in these 5G modems. Ensuring the security and privacy of smartphones is crucial to maintain user trust and safeguard sensitive data in an increasingly interconnected world.

Explore more

A Unified Framework for SRE, DevSecOps, and Compliance

The relentless demand for continuous innovation forces modern SaaS companies into a high-stakes balancing act, where a single misconfigured container or a vulnerable dependency can instantly transform a competitive advantage into a catastrophic system failure or a public breach of trust. This reality underscores a critical shift in software development: the old model of treating speed, security, and stability as

AI Security Requires a New Authorization Model

Today we’re joined by Dominic Jainy, an IT professional whose work at the intersection of artificial intelligence and blockchain is shedding new light on one of the most pressing challenges in modern software development: security. As enterprises rush to adopt AI, Dominic has been a leading voice in navigating the complex authorization and access control issues that arise when autonomous

Canadian Employers Face New Payroll Tax Challenges

The quiet hum of the payroll department, once a symbol of predictable administrative routine, has transformed into the strategic command center for navigating an increasingly turbulent regulatory landscape across Canada. Far from a simple function of processing paychecks, modern payroll management now demands a level of vigilance and strategic foresight previously reserved for the boardroom. For employers, the stakes have

How to Perform a Factory Reset on Windows 11

Every digital workstation eventually reaches a crossroads in its lifecycle, where persistent errors or a change in ownership demands a return to its pristine, original state. This process, known as a factory reset, serves as a definitive solution for restoring a Windows 11 personal computer to its initial configuration. It systematically removes all user-installed applications, personal data, and custom settings,

What Will Power the New Samsung Galaxy S26?

As the smartphone industry prepares for its next major evolution, the heart of the conversation inevitably turns to the silicon engine that will drive the next generation of mobile experiences. With Samsung’s Galaxy Unpacked event set for the fourth week of February in San Francisco, the spotlight is intensely focused on the forthcoming Galaxy S26 series and the chipset that