Anche la rete cellulare 4G a rischio DoS
Alcuni ricercatori presentano al Black Hat Europe la modalità con cui è possibile condurre un DoS verso gli utenti della rete 4G. Neanche il 4G sfugge quindi alle possibilità di disservizi legati a vulnerabilità di protocollo e le tecniche utilizzabili sono 3:
DoS using Cancel Location Request (CLR): This is sent by the home subscriber service (HSS) to the mobile management entity (MME) to wipe a user from the network.
DoS using Insert Subscriber Data Request (IDR): These are sent from the HSS to the MME to update and/or request user data like location and/or state information. This attack on the MME, which covers a broad area (for context, Holtsmann noted that London has two), has an impact on any users located in the affected region.
DoS using Update Location Request (ULR): This is sent by the MME to the HSS to inform of a user's change in location. The user may be kicked outside the network, but there are no major side effects. Users can fix the problem by switching off their phone and reconnecting.
Articolo: Dark Reading