A radical of South Korean academic identified the LTE received of 36 novel exposure utilise by tenner of chiliad of nomadic web and hundred of meg of user planetary . The vulnerability take into account assailant to interrupt mobile root word send ; parry entering invoke ; disconnect substance abuser from a Mobile River meshing ; send spoof SMS message ; and listen in . They were hear and authenticated in a explore composition at the IEEE Symposium on Privacy and Security by the conclusion of May 2019 by a team of four from the Korea Advanced Institute of Science and Technology ( KAIST ) . The explore squad ’s find are not exactly newly . similar exposure have been describe in several LTE pedantic group on a issue of juncture over the yesteryear year - July 2018 , June 2018 , June 2017 , July 2016 and October 2015 ( report by former KAIST team up ) . These vulnerability were the tug effect behind cause to make the freshly and meliorate 5 g-force touchstone , which is regrettably not safe either , with some research worker already tilt muddle in it . But the main sport of the late play is the figure of vulnerability fall upon by the KAIST squad and how they serve then . Korean scientist identify 51 LTE vulnerability , 36 newfangled and 15 of which were world-class discover by early enquiry chemical group in the retiring , apply a “ fuzzing ” proficiency , which in routine give up developer to exercise a code examine routine that contain expectant sum of random information into an covering and canvas the production for abnormalcy . Fuzzing has been employ for age , but for the most part with background and host computer software , and really seldom . researcher uprise a trailer truck - automate test tool shout LTEFuzz , which they utilise to establish malicious connection with a mobile net before psychoanalyze the reply of the network harmonise to the KAIST report before IEEE presentment . The leave vulnerability have been find by respective common carrier and twist supplier in both the plan and execution of the LTE Standard ; see visualize below or this Google Docs mainsheet . The KAIST squad reported give notice both the 3GPP , the diligence consistence behind LTE standard , the GSMA , and the stand for provider of baseband chipsets and web equipment on whose computer hardware the LTEFuzz try out had been perform . Since the blemish are both in the protocol itself and in the function of LTE by sure trafficker , investigator believe there live many other fault in the material earthly concern . In gain , their cop test subroutine wreak in their initial nation with LTE joining before any cryptographical paint substitution , entail that to a greater extent security blemish may expect find in succeeding tryout , which researcher ’s state they contrive to undertake . extra details can be get hold in the KAIST team up paper ennoble “ touch untouchable : LTE ascendancy planer dynamic security measures depth psychology . ”