The newly identified “Context Integrity Violation” flaw exposes billions of users to data leaks, service disruption, and location tracking—raising urgent calls for new mobile security standards.

In a wake-up call for the telecom industry, researchers from the Korea Advanced Institute of Science and Technology (KAIST) have uncovered a new class of vulnerabilities that could let remote attackers compromise mobile networks used by billions worldwide. The flaws—dubbed Context Integrity Violations (CIV)—strike at the heart of LTE infrastructure, allowing attackers to manipulate internal network information without authentication.
The research, led by Professor Yongdae Kim from KAIST’s School of Electrical Engineering. Unlike previous work focusing on “downlink” threats, where networks attack devices, this study explored “uplink” security—the reverse direction where devices could target the core network itself. According to Kim, the root cause lies in gaps within the 3GPP standards that govern how global cellular systems operate. These standards forbid processing unauthenticated messages but fail to specify how to handle messages that skip authentication altogether—creating a loophole attackers can exploit.
To uncover these weaknesses, the team developed CITesting, the world’s first systematic testing framework capable of scanning thousands of scenarios—far surpassing previous tools like LTEFuzz. When tested on four major LTE core network systems, both open-source and commercial, the results were alarming: every system showed vulnerabilities. Open5GS recorded 2,354 detections, srsRAN 2,604, Amarisoft 672, and Nokia 2,523—each with multiple unique flaws.
The researchers demonstrated three serious attack scenarios: denial of service, where attackers disrupt network reconnections; IMSI exposure, revealing user identity numbers in plaintext; and location tracking, enabling remote monitoring through legitimate base stations. Because these attacks operate through existing infrastructure, they could target entire citywide coverage zones without any specialized hardware.
Following the team’s disclosure, Amarisoft and Open5GS issued patches, but Nokia declined, citing adherence to 3GPP guidelines. The team now plans to extend its work to 5G and private industrial networks, where similar vulnerabilities could threaten critical communications. As mobile networks evolve into the backbone of global connectivity, the findings highlight a sobering truth: the security of the world’s communication systems still hinges on standards written for a far simpler era—one that no longer exists.




