Vulnerabilities in LTE and 5G Networks 2020 report published by London-based cybersecurity firm Positive Technologies last week. Report: GTP protocol contains a number of vulnerabilities threatening both mobile operators and their clients. Main flaw stems from fact that the protocol does not check for the subscriber’s actual location, thereby making it difficult to verify if the incoming traffic is legitimate. Attacks can also be used by a dishonest MNO to create roaming traffic, with the MNO (falsely) charging another operator for non-existent roaming activity.
Source: https://thehackernews.com/2020/06/mobile-internet-hacking.html