Description
Adversaries may exploit vulnerabilities in telecom network elements to gain higher privileges.
Sub-techniques
Specific variations of this technique
MOT3027.301Exploit Network Function Vulnerability
2G
3G
4G
5G-SA: Demonstrated
Adversaries may exploit vulnerabilities in network functions to gain higher privileges.
MOT3027.302Exploit Management System Vulnerability
2G
3G
4G
5G-SA: Demonstrated
Adversaries may exploit vulnerabilities in management systems to gain higher privileges.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable