09_threat_model_5g

Part 9: Threat Model - 5G Attack Surface

Learning Objective: Apply STRIDE threat modeling to identify 5G SA vulnerabilities and mitigations.


5G SA Attack Surface Map

graph TB
    subgraph "Radio"
        UE[📱 UE]
        gNB[📡 gNB]
    end
    
    subgraph "SBA (HTTP/2 APIs)"
        NRF[NRF]
        SCP[SCP]
        AMF[AMF]
        SMF[SMF]
        AUSF[AUSF]
        UDM[UDM]
        PCF[PCF]
    end
    
    subgraph "User Plane"
        UPF[UPF]
    end
    
    UE -.->|✅ N1 NAS
Encrypted| AMF gNB -.->|❌ N2 NGAP
No mTLS| AMF gNB -.->|❌ N3 GTP-U
No encryption| UPF AMF -.->|❌ SBI HTTP/2
No mTLS default| NRF SMF -.->|❌ SBI HTTP/2
No OAuth2| UDM SCP -.->|❌ SPOF
No redundancy| AMF style UE fill:#ccffcc style gNB fill:#ffcccc style SCP fill:#ffcccc style NRF fill:#ffcccc

Threat Catalog

1. SBA API Attack Surface (S, T, I, E)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: S=High, T=High, I=High, E=High


2. SUPI/SUCI Privacy Attacks (I)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: I=Medium


3. Network Slice Isolation Bypass (E, I)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: E=High, I=Medium


4. SEPP and N32 Roaming Security (S, T, I)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: S=High, T=High, I=High


5. UPF GTP-U Tunneling Attacks (T, D)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: T=High, D=High


6. SCP as Single Point of Failure (D)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: D=Critical


7. AMF/SMF API Abuse (E, D)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: E=High, D=High


8. NRF Poisoning (S, D)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: S=Critical, D=High


9. 5G-AKA Replay Attacks (S)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: S=Medium


10. N2 NGAP Unencrypted (I, T)

Attack Vector:

Impact:

Mitigation:

STRIDE Score: I=High, T=High


5G Attack Kill Chain

graph LR
    A[1. Reconnaissance
Scan for open SBI ports] --> B[2. Initial Access
Exploit unauthenticated API] B --> C[3. Execution
Register rogue NF with NRF] C --> D[4. Persistence
Maintain NRF registration] D --> E[5. Privilege Escalation
Access AMF/SMF APIs] E --> F[6. Defense Evasion
Blend with legitimate traffic] F --> G[7. Credential Access
Exfiltrate SUPI from UDM] G --> H[8. Discovery
Enumerate all NFs via NRF] H --> I[9. Lateral Movement
Pivot to other NFs] I --> J[10. Collection
Intercept subscriber data] J --> K[11. Exfiltration
Send data to C2] K --> L[12. Impact
DoS or data breach] style A fill:#ffcccc style L fill:#ff9999

Threat Summary Table

Threat S T R I D E Severity
SBA API Abuse Critical
SUPI/SUCI Attack Medium
Slice Isolation Bypass High
SEPP/N32 Exploit High
UPF GTP-U Injection High
SCP SPOF Critical
AMF/SMF API Abuse High
NRF Poisoning Critical
5G-AKA Replay Medium
N2 Unencrypted High

5G vs 4G Security Improvements

Feature 4G 5G SA
IMSI Privacy ❌ Cleartext ✅ SUCI (encrypted)
SBI Security N/A (point-to-point) ⚠️ HTTP/2 (needs mTLS)
Slice Isolation ❌ No slicing ⚠️ Requires proper config
Roaming Security ⚠️ Diameter (weak) ✅ SEPP + N32 mTLS
User Plane Encryption ⚠️ Optional (rarely used) ⚠️ Optional (rarely used)

Summary

Next: Part 10: K8s + Telecom Threats