Credential Access
MOT3004.302
Sub-technique

UDM/AUSF Data Access

Public
5G-SA: Theoretical
Description

The adversary may acquire subscriber authentication information from 5G core network functions such as UDM (Unified Data Management) or AUSF (Authentication Server Function).

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Not Applicable
5G-SA
Theoretical
5G-NSA
Not Applicable