Mobile Threat Catalogue

User Impersonation

Contribute

Threat Category: Carrier Infrastructure

ID: CEL-34

Threat Description: Intruder obtains authentication data and pretends to be the user. Authentication data could be obtained by a fake/rogue base station or eavesdropping on a connection.

Threat Origin

3G Security: Security Threats and Requirements (Release 4) 1

Exploit Examples

Not Applicable

CVE Examples

Not Applicable

Possible Countermeasures

References

  1. 3G Security; Security Threats and Requirements (Release 4), 3GPP TS 21.133 V4.0.0, 3rd Generation Partnership Project, 2003; www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/Old_Vsns/21133-400.pdf [Accessed 8/23/2016]