Actions
Bug #1478
openIMSI DETACH DoS
Status:
New
Priority:
High
Assignee:
-
Category:
Um (MS-BTS) interface
Target version:
-
Start date:
Due date:
% Done:
0%
Resolution:
Spec Reference:
Description
In GSM networks that use the IMSI ATTACH/DETACH procedure, the IMSI DETACH message is not authenticated.
A malicious attacker knowing the IMSI or TMSI of a victim can thus send hand-crafted IMSI DETACH messages to a cell, causing the network to assume the MS is no longer present in the network.
This will effectively prevent the delivery of all mobile-terminated (MT) services, such as SMS, voice calls, CSD, ...
This flaw was first discovered in May 2010 by Sylvain Munaut.
Actions