Researchers have developed Sni5Gect, an open-source toolkit that can intercept and inject messages in 5G networks to downgrade connections or crash devices without using rogue base stations. This groundbreaking method exploits unencrypted early-stage messages, revealing significant vulnerabilities in 5G communication protocols. #Sni5Gect #5Gvulnerabilities
Keypoints
- The Sni5Gect toolkit allows over-the-air message sniffing and injection in 5G networks.
- It can cause devices to crash, downgrade from 5G to 4G, or bypass authentication processes.
- The attack exploits unencrypted messages during the connection setup phase, before authentication.
- Tests on popular smartphones achieved up to 80% accuracy in message interception and 90% success in injection.
- The GSMA has officially recognized and assigned an identifier to the vulnerability, CVD-2024-0096.
Read More: https://thehackernews.com/2025/08/new-sni5gect-attack-crashes-phones-and.html