Description
Adversaries may exploit vulnerabilities in management interfaces of telecom equipment to gain initial access.
Sub-techniques
Specific variations of this technique
MOT3022.301Element Management System
2G
3G
4G
5G-SA: Demonstrated
Adversaries may exploit vulnerabilities in Element Management Systems (EMS) to gain access to network elements.
MOT3022.302Network Management System
2G
3G
4G
5G-SA: Demonstrated
Adversaries may exploit vulnerabilities in Network Management Systems (NMS) to gain access to multiple network elements.
MOT3022.303NFV MANO Interface
4G
5G-SA: Demonstrated
Adversaries may exploit vulnerabilities in NFV Management and Orchestration (MANO) interfaces to gain access to virtualized network functions.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable