Commercial loT service platform security configurations
10
Platform design and forged access?
11
Guessable username and password policies for API authentication
12
Token management
13
Lack of rate limiting for API requests
14
Private identifiers used in apps domain
15
Verbose error messages
16
Firewall vs secure API-by-design
17
Malware propagation inside user plane
18
Internal node exposure
19
Broken authorization while sending downlink message
20
Access control misconfiguration
21
Script Injection
22
XSS execution
23
Summary of security analysis
Description:
Explore the critical security vulnerabilities in 4G and 5G mobile network APIs that enable next-generation AI, MEC, and IoT applications in this 40-minute Black Hat conference talk. Delve into practical details of these APIs and learn about the security investigation conducted on hundreds of APIs from 10 commercial providers and operators, revealing widespread critical weaknesses. Discover attack models for network exposure, commercial IoT service platform security configurations, and various security issues such as guessable username and password policies, token mismanagement, and lack of rate limiting. Examine potential threats like malware propagation, internal node exposure, and script injection. Gain insights into the importance of secure API-by-design approaches and proper access control configurations to protect mobile networks from emerging threats.
Attacks From a New Front Door in 4G & 5G Mobile Networks