Sni5Gect Attack Framework Enables 5G Downgrade and Modem Crashes
Summary
Hide ▲
Show ▼
A team of academics from the Singapore University of Technology and Design (SUTD) has developed a new attack framework, Sni5Gect, that can downgrade 5G connections to 4G and crash phone modems. The attack leverages unencrypted messages exchanged during the initial connection process, bypassing the need for a rogue base station. The framework has been tested successfully against multiple smartphone models, demonstrating high accuracy in sniffing and injecting malicious payloads. The Global System for Mobile Communications Association (GSMA) has acknowledged the attack and assigned it the identifier CVD-2024-0096. The Sni5Gect toolkit enables passive sniffing and stateful injection, providing a new vector for 5G security research and exploitation.
Timeline
-
26.08.2025 20:23 1 articles · 1mo ago
Sni5Gect Attack Framework Developed for 5G Exploitation
A team of academics from the Singapore University of Technology and Design (SUTD) has developed the Sni5Gect framework, which can downgrade 5G connections to 4G and crash phone modems. The attack leverages unencrypted messages during the initial connection process, bypassing the need for a rogue base station. The framework has been tested successfully against multiple smartphone models, demonstrating high accuracy in sniffing and injecting malicious payloads. The GSMA has acknowledged the attack and assigned it the identifier CVD-2024-0096.
Show sources
- New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station — thehackernews.com — 26.08.2025 20:23
Information Snippets
-
Sni5Gect is an open-source software toolkit designed to sniff unencrypted messages between base stations and user equipment (UE).
First reported: 26.08.2025 20:231 source, 1 articleShow sources
- New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station — thehackernews.com — 26.08.2025 20:23
-
The framework can crash UE modems, downgrade connections to 4G, fingerprint devices, and bypass authentication.
First reported: 26.08.2025 20:231 source, 1 articleShow sources
- New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station — thehackernews.com — 26.08.2025 20:23
-
Sni5Gect operates by sniffing messages during the initial connection process before encryption is established.
First reported: 26.08.2025 20:231 source, 1 articleShow sources
- New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station — thehackernews.com — 26.08.2025 20:23
-
The attack does not require knowledge of the UE's credentials to sniff or inject messages.
First reported: 26.08.2025 20:231 source, 1 articleShow sources
- New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station — thehackernews.com — 26.08.2025 20:23
-
Tests on five smartphone models showed 80% accuracy in sniffing and 70-90% success in injecting messages from up to 20 meters.
First reported: 26.08.2025 20:231 source, 1 articleShow sources
- New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station — thehackernews.com — 26.08.2025 20:23
-
The GSMA has acknowledged the attack and assigned it the identifier CVD-2024-0096.
First reported: 26.08.2025 20:231 source, 1 articleShow sources
- New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station — thehackernews.com — 26.08.2025 20:23