Some Huawei 4G LTE devices are exposed to a message replay vulnerability. or the sake of better compatibility, these devices implement a less strict check on the NAS message sequence number (SN), specifically NAS COUNT. As a result, an attacker can construct a rogue base station and replay the GUTI reallocation command message in certain conditions to tamper with GUTIs, or replay the Identity request message to obtain IMSIs. (Vulnerability ID: HWPSIRT-2019-04107)
This vulnerability has been assigned a CVE ID: CVE-2019-5307.
Huawei has released software updates to fix this vulnerability. This advisory is available at the following link:
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-replay-en
Product Name
|
Affected Version
|
Resolved Product and Version
|
P30
|
The versions before ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1)
|
ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1)
|
P30 Pro
|
The versions before VOG-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1)
|
Upgrade to VOG-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1)
|
Attackers can exploit this vulnerability to tamper with GUTIs or obtain IMSIs.
Data services are unavailable after users access the rogue base station. Therefore, replaying the GUTI reallocation command message brings forth no additional impact. After users move out of the rogue base station, GUTIs are reset to normal values.
It is stipulated in 3GPP standard that IMSIs can be transmitted in plaintext in certain conditions. Therefore, no additional impact is caused even if the Identity request message is replayed.
The vulnerability classification has been performed by using the CVSSv3 scoring system (
http://www.first.org/cvss/specification-document).
Base Score: 4.2 (AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
Temporal Score: 3.9 (E:F/RL:O/RC:C)
Overall Score: 3.9
This vulnerability can be exploited only when the following conditions are present:
A rogue base station has been constructed, and victims have accessed this station.
Vulnerability details:
Some Huawei 4G LTE devices are exposed to a message replay vulnerability. or the sake of better compatibility, these devices implement a less strict check on the NAS message sequence number (SN), specifically NAS COUNT. As a result, an attacker can construct a rogue base station and replay the GUTI reallocation command message in certain conditions to tamper with GUTIs, or replay the Identity request message to obtain IMSIs.
The product that supports automatic update will receive a system update prompt. You can install the update to fix the vulnerability.
This vulnerability was reported to Huawei PSIRT by Yongdae Kim, Hongil Kim, Jiho Lee and Eunkyu Lee of KAIST. Huawei would like to thank them for working with us and coordinated vulnerability disclosure to protect our customers.
Huawei adheres to protecting the ultimate interests of users with best efforts and the principle of responsible disclosure and deal with product security issues through our response mechanism.
To enjoy Huawei PSIRT services and obtain Huawei product vulnerability information, please visit http://www.huawei.com/en/psirt.
To report a security vulnerability in Huawei products and solutions, please send it to PSIRT@huawei.com. For details, please visit http://www.huawei.com/en/psirt/report-vulnerabilities.
This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, either express or implied, including the warranties of merchantability or fitness for a particular purpose. In no event shall Huawei or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Huawei is entitled to amend or update this document from time to time.