New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

Researchers have developed Sni5Gect, an open-source toolkit that can intercept and inject messages in 5G networks to downgrade connections or crash devices without using rogue base stations. This groundbreaking method exploits unencrypted early-stage messages, revealing significant vulnerabilities in 5G communication protocols. #Sni5Gect #5Gvulnerabilities

Keypoints

  • The Sni5Gect toolkit allows over-the-air message sniffing and injection in 5G networks.
  • It can cause devices to crash, downgrade from 5G to 4G, or bypass authentication processes.
  • The attack exploits unencrypted messages during the connection setup phase, before authentication.
  • Tests on popular smartphones achieved up to 80% accuracy in message interception and 90% success in injection.
  • The GSMA has officially recognized and assigned an identifier to the vulnerability, CVD-2024-0096.

Read More: https://thehackernews.com/2025/08/new-sni5gect-attack-crashes-phones-and.html