Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G CoresIn the second part of this series, we will examine how attackers can trigger vulnerabilities by sending control messages masquerading as user traffic to cross over from user plane to control plane.
Source:
Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores