The Rapid Arrival of 5G Can Pose Security Problems

5G is the mobile technology that will accompany us for the next decade. It brings important news in terms of improvements in speed, latency or coverage. Although its implementation is still far from complete, there are more and more compatible devices. However, in this article we echo a news item that warns about how the rapid arrival of 5G is going to bring security problems.

Security issues will affect 5G at first

One of the most important issues when a new technology of this type appears is the necessary infrastructure. This requires an investment, the installation of antennas to be able to connect, etc.

Rapid Arrival of 5G Can Pose Security Problems

Now, 5G is still far from having its own infrastructure, at least completely. The first stages, the first moments in which we have access to this network, will use existing 4G LTE infrastructures as a base. It is a non-autonomous architecture that makes it possible to provide network access to clients in a faster way.

The problem is that this can also expose the 5G network to existing security problems. Basically the same threats that affect 4G.

A new whitepaper from Positive Technologies details how mobile network operators that have already started to upgrade to 5G networks can migrate from previous generation networks without exposing themselves and their subscribers to new and existing risks.

However, for years to come, most 5G networks will continue to depend on 4G networks, which means that exclusively 5G security efforts are futile and dangerous. They believe that the security of 5G must go further. They should build hybrid networks that support both 4G LTE and 5G, thus correcting potential vulnerabilities.

They also indicate that the network must be carefully reviewed to detect configuration errors, which requires a regular assessment of the security status of the infrastructure.

Problemas con el 5G

Positive Technologies have demonstrated attacks using 4G flaws

Positive Technologies have previously shown that an attacker can take advantage of the vulnerabilities that are present in 4G to cause denial of service attacks, track the location of the subscriber, obtain information from the customer’s profile and commit fraud. In the latest report, experts at Positive Technologies argue that with non-autonomous 5G architecture, previous-generation protocols need to be protected, as networks are so intertwined that simply defending 5G is not enough.

In short, the fact that 5G networks are available quickly can also have security consequences, according to experts. There are certain vulnerabilities that are present in 4G networks and that could also harm the new technology. There is still a long way to go until there is a truly autonomous infrastructure where all the new security measures can be implemented.