Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE:...

59
Dissecting VoLTE: Exploiting Free Data Channels and Security Problems Hongil Kim, Dongkwan Kim @ SysSec Lab. 32C3 1 Credits: Minhee Kwon, Hyeongseok Han, Yeongjin Jang, Taesoo Kim, Dongsu Han, Yongdae Kim

Transcript of Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE:...

Page 1: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Dissecting VoLTE: Exploiting Free Data Channels and Security Problems

Hongil Kim, Dongkwan Kim @ SysSec Lab.

32C3

1

Credits: Minhee Kwon, Hyeongseok Han, Yeongjin Jang, Taesoo Kim, Dongsu Han, Yongdae Kim

Page 2: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

2

KIM, HONG IL

KIM,DONG KWAN

Ph.D. student at System Security Lab. KAIST

Research interest:• Cellular network system • Mobile device security• Internet of Things (IoT) security

M.S. student at System Security Lab. KAIST

Research interest:• Cellular Security• CPS Security• System Security

Page 3: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

VoLTE = Voice over LTE Implementation of VoIP on LTE

3G network

– Data and voice are separated

4G LTE network : All-IP based Network

– Both data and voice are delivered as data-flow

Advantages on VoLTE

– For users: high voice quality, faster call setup, better battery life.

– For operators: increase usability, reduce cost, rich multimedia services

3

Page 4: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

4

TelephonyPhone

Data(Packet Switching)

Internet

3G

Voice(Circuit Switching)Cell

tower

IMSCell

tower

Phone

4G LTE

Data(Packet Switching)

Internet

IP Multimedia Subsystem (IMS)

Core network

Core network

Page 5: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Each service is delivered by bearer In LTE, all services are delivered data channels, called “bearers”

– Data, Voice, Video, …

Bearer: a virtual channel with below properties

– Based on QCI* value, it determines bandwidth, loss rate, latency (QoS)

– Default bearer: Non Guaranteed Bit rate

– Dedicated bearer: Guaranteed Bit rate

5

4G Gateway

Default bearer for VoLTE (2.2.2.2)

IMS

Internet

Dedicated bearer for VoLTE (RTP)

Dedicated bearer for data (HTTP)

Default bearer for data (1.1.1.1)

*QCI: QoS Class Identifier

Page 6: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Each service is delivered by bearer In LTE, all services are delivered data channels, called “bearers”

– Data, Voice, Video, …

Bearer: a virtual channel with below properties

– Based on QCI value, it determines bandwidth, loss rate, latency (QoS)

– Default bearer: Non Gauranteed Bit rate

– Dedicated bearer: Gauranteed Bit rate

6

4G Gateway

Default bearer for VoLTE (2.2.2.2)

IMS

Internet

Dedicated bearer for VoLTE (SIP)

Dedicated bearer for data (HTTP)

Default bearer for data (1.1.1.1)

QCI Bearer Type Priority Packet DelayPacket

LossUsage

1

Gauranteed Bit rate

2 100 ms 10−2 Voice data (VoLTE)

2 4 150 ms 10−3 Video data

3 3 50 ms

10−6

Real-time gaming

4 5 300 ms Buffered streaming

5

Non Gauranteed Bit rate

1 100 msIMS signaling (VoLTE

signaling)

6 6 300 msBuffered streaming, TCP

based services

7 7100 ms 10−3 Live streaming, Interactive

Gaming

8 8300 ms 10−6

TCP based services e.g. email, ftp, chat etc.9 9

Page 7: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Voice delivery in LTE Voice is delivered through two bearers

For VoLTE service,

1. Default bearer: call signaling (control-plane), *SIP

2. Dedicated bearer: voice data (data-plane), *RTP

7

4G Gateway

Default bearer, IP addr : 1.1.1.1 (SIP)

IMS

Internet

Dedicated bearer, port: 1234 (RTP)

*SIP: Session Initiation Protocol, *RTP: Real-time Transport Protocol

Page 8: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Let’s check potential attack vectors newly introduced in VoLTE

VoLTE makes cellular network more complex

8

IMS

Cell

tower

Phone

4G LTE

3GPP standards

Mobile OS support?

LTE Core

Device HW interface

Implementation of LTE core

Accounting infrastructure

4G Gateway

Page 9: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Let’s check potential attack vectors newly introduced in VoLTE

VoLTE makes cellular network more complex

8

IMS

Cell

tower

Phone

4G LTE

3GPP standards

Mobile OS support?

LTE Core

Device HW interface

Implementation of LTE core

Accounting infrastructure

4G GatewayPermission

Mismatch

Free Data Channels

No Session Manage

No Auth

No EncryptionIMS

Bypassing

Page 10: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

#1: VoLTE Accounting Accounting in 3G

9

Telephony

Phone

Data (Packet Switching) Internet

Voice (Circuit Switching)Cell

tower

IMSPhone

Data (Packet Switching)Internet

Cell tower

Byte usage

Time usage

Accounting in 4G (using VoLTE)

Byte usage for all services?

Still time usage

Unlimited VoLTE call

Page 11: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

#1: VoLTE Accounting Accounting in 3G

9

Telephony

Phone

Data (Packet Switching) Internet

Voice (Circuit Switching)Cell

tower

IMSPhone

Data (Packet Switching)Internet

Cell tower

Byte usage

Time usage

Accounting in 4G (using VoLTE)

Byte usage for all services?

Still time usage

Unlimited VoLTE call

Do operators implement this complicated accounting correctly?

Page 12: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Anatomy of smartphone Smartphone has two processors

10

AP

CP

Application processor (AP)- Running mobile OS (Android)

- Running User application

Communication processor (CP)- Telephony Processor (modem)- Digital Signal Processing (DSP)

Page 13: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

#2 Voice solution in device, 3G case3G Phone

11

• An app cannot easily manipulate the voice signaling in CP

AP

CP Voice signaling

Call APIs

Telephony

Phone

Data Internet

3G network

VoiceCell Tower

AP

CP

• An app needs “CALL_PHONE” permission for calling

Page 14: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

#2: Voice solution in device, LTE4G LTE Phone

12

• An app can easily manipulate voice signaling in AP

AP

CP

Voice signaling

IMS

Phone

DataInternet

4G LTE network

Cell Tower

AP

CP

Application processor- Running mobile OS (Android)- Running User application

Page 15: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

#2: Voice solution in device, LTE4G LTE Phone

12

• An app can easily manipulate voice signaling in AP

AP

CP

Voice signaling

IMS

Phone

DataInternet

4G LTE network

Cell Tower

AP

CP

Application processor- Running mobile OS (Android)- Running User application

Page 16: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

#2: Voice solution in device, LTE4G LTE Phone

12

• An app can easily manipulate voice signaling in AP

AP

CP

Voice signaling

IMS

Phone

DataInternet

4G LTE network

Cell Tower

AP

CP

Application processor- Running mobile OS (Android)- Running User application

• Can an app make a call without “CALL_PHONE” permission?

Page 17: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Two findings in VoLTE

1. A complex accounting infrastructure

2. Delegating voice signaling (previously done by CP) to AP

11

Page 18: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Our approach to attack two findings Analyze 3GPP standards related with VoLTE service

– Leave detail implementation to operators, chipset vendors, …

Make a checklist of potential vulnerable points in the VoLTE feature

– About 60 items for both control and data plane

Perform an analysis in 5 major operational networks

– 2 U.S. operators and 3 South Korea operators

14

Page 19: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Quick summary of results Four free data channels

– Using VoLTE protocol (for all operators)

SIP tunneling

Media tunneling

– Direct communication (for some operators)

Phone-to-Internet

Phone-to-Phone

Five security issues

– No encryption of voice packets

– No authentication of signaling

– No call session management (DoS on the cellular infrastructure)

– IMS bypassing

– Permission model mismatch (VoLTE call without “CALL_PHONE” permission)

15

Page 20: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

VoLTE Call Procedure

16

INVITE

200 OK

Caller SIP server Callee

Voice Session (RTP payload = voice data)

Header : phone # of caller/callee, …Body : IP addr, port no., ……

*SIP: Session Initiation Protocol, *RTP: Real-time Transport Protocol

Page 21: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Free Channel: SIP Tunneling

17

INVITE

Caller SIP server Callee

Header : phone # of caller/callee, injected dataBody : IP addr, port no., injected data

603 Decline

Voice Session (RTP payload = voice data)

*SIP: Session Initiation Protocol, *RTP: Real-time Transport Protocol

Page 22: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Free Channel: Media Tunneling

18

INVITE

200 OK

Caller SIP server Callee

Voice Session (RTP payload = Injected data)

Header : phone # of caller/callee, …Body : IP addr, port no., ……

*SIP: Session Initiation Protocol, *RTP: Real-time Transport Protocol

Page 23: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Attack Implementation in Detail

19

AP

CP

AP

CP

SIP Sender

MediaSender

VoLTE Interface

SIP Receiver

MediaReceiver

IMSSIP, RTP SIP

Caller CalleeCore Network

VoLTE Interface

Audio Data(60-100 bytes)

DIAGCommand

Page 24: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Command Opcode

MEMORY READ/WRITE 17, 18, ...

PASSWORD 70, ...

SMS READ/WRITE 83, 84, ...

LOG 15, 16, ...

Diagnostic Protocol (DIAG) Proprietary protocol by QualComm

Several functions (memory read/write, SMS read/write, signaling dump, ...)

Real-time data logging for RF diagnosis (Diagnostic Monitor)

20

DM Software

DM Key

* Delugre, “Reverse Engineering a Qualcomm Baseband”, 28C3

Page 25: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Attack Implementation in Detail

22

AP

CP

AP

CP

SIP Sender

MediaSender

VoLTE Interface DIAG

SIP Receiver

MediaReceiver

VoLTE

IMSSIP, RTP SIP RTP

Caller CalleeCore Network

DIAGCommand

Page 26: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Outline Four free data channels

– Using VoLTE protocol (for all operators) SIP tunneling Media tunneling

– Direct communication (for some operators) Phone-to-Internet Phone-to-Phone

Five security issues– No encryption of voice packets– No authentication of signaling– No call session management (DoS on the cellular infrastructure)– IMS bypassing– Permission model mismatch (VoLTE call without “CALL_PHONE” permission)

23

Page 27: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

24

Free Channel: Direct communication Phone-to-Internet

– Open a TCP/UDP socket with voice IP

– Send data to the Internet

E.g. TCP/UDP Socket (Src: voice IP/port, Dst: youtube.com/port)

4G Gateway

IMS

InternetDefault bearer for VoLTE, 1.1.1.1

Page 28: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Free Channel: Direct communication Phone-to-Phone

– Open a TCP/UDP socket with voice IP

– Send data to callee

E.g. TCP/UDP Socket (Src: voice IP/port, Dst: callee’s voice IP/port)

4G Gateway

IMS

InternetDefault bearer for VoLTE, 1.1.1.1

Page 29: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Overbilling with Direct Communication? Phone-to-Phone

– Open a TCP/UDP socket with voice IP

– Send data to callee

E.g. TCP/UDP Socket (Src: voice IP/port, Dst: callee’s data IP/port)

4G Gateway

IMS

InternetDefault bearer for VoLTE, 1.1.1.1

Li et al. ,Insecurity of Voice Solution VoLTE in LTE Mobile Networks, CCS’15

Page 30: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Evaluation Result: Accounting Bypass

27

Free Channel US-1 US-2 KR-1 KR-2 KR-3

Using VoLTE

Protocol

SIP Tunneling ✓ ✓ ✓ ✓ ✓

Media Tunneling ✓ ✓ ✓ ✓ ✓

Direct

Communication

Phone to Phone ✓ ✘ ✓ ✘ ✘

Phone to Internet ✘ ✓ ✓ ✘IPv4:✓IPv6:✘

Last update: 20th April, 2015

✓: vulnerable/not charged, x: secure

Page 31: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Evaluation Result: Accounting Bypass

29

Free Channel US-1 US-2 KR-1 KR-2 KR-3

Using VoLTE

Protocol

SIP Tunneling ✓ ✓ ✓ ✓ ✓

Media Tunneling ✓ ✓ ✓ ✓ ✓

Direct

Communication

Phone to Phone ✓ ✘ ✘ ✘ ✘

Phone to Internet ✘ ✓ ✘ ✘IPv4:✓IPv6:✘

Last update: 30th Nov., 2015

✓: vulnerable/not charged, x: secure

Page 32: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Evaluation Result: Accounting Bypass

31

Free Channel US-1 US-2 KR-1 KR-2 KR-3

Using VoLTE

Protocol

SIP Tunneling ✓ ✓ ✓ ✓ ✓

Media Tunneling ✓ ✓ ✓ ✓ ✓

Direct

Communication

Phone to Phone ✓ ✘ ✓ ✘ ✘

Phone to Internet ✘ ✓ ✓ ✘IPv4:✓IPv6:✘

Last update: 20th April, 2015

21.5 Mbps

16.8 Mbps

42 Kbps

X

✓: vulnerable/not charged, x: secure

Page 33: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Outline Four free data channels

– Using VoLTE protocol (for all operators) SIP tunneling Media tunneling

– Direct communication (for some operators) Phone-to-Internet Phone-to-Phone

Five security issues– No encryption of voice packets– No authentication of signaling– No call session management (DoS on the cellular infrastructure)– IMS bypassing– Permission model mismatch (VoLTE call without “CALL_PHONE” permission)

32

Page 34: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

No Encryption for Voice Packets For voice signaling,

– only one operator was using IPsec

– An attacker can easily manipulate VoLTE call flow

For voice data,

– no one encrypted voice data

– An attacker might wiretap the outgoing voice data

33

Weak Point Vulnerability US-1 US-2 KR-1 KR-2 KR-3 Possible Attack

IMSNo SIP Encryption X ✓ ✓ ✓ Message manipulation

No Voice Data Encryption ✓ ✓ ✓ ✓ ✓ Wiretapping

: Vulnerable : Secure

Page 35: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

No Encryption for Voice Packets

34

US-1 US-2 KR-1 KR-2 KR-3

Network protocol IPv6 IPv6 + IPsec IPv4 IPv4 IPv6

Transport protocol for SIP TCP & UDP TCP & UDP UDP UDP UDP

Encryption algorithm for IPsec - AES - - -

Redacted

Page 36: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Is Wiretapping Possible?

35

IMS

Cell towerPhone

4G LTE

4G Gateway

Phone

Internet

LTE Core

Femtocell

Page 37: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Even some operators are providing Wi-Fi calling without encryption!

Wiretapping Is Possible!

40

IMS

Cell towerPhone

4G LTE

4G Gateway

Phone

Internet

LTE Core

Femtocell

Phone Access

Point

Page 38: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

No Encryption for Voice Packets For voice signaling,

– only one operator was using IPsec

– An attacker can easily manipulate VoLTE call flow

For voice data,

– no one encrypted voice data

– An attacker might wiretap the outgoing voice data

41

Weak Point Vulnerability US-1 US-2 KR-1 KR-2 KR-3 Possible Attack

IMSNo SIP Encryption X ✓ ✓ ✓ Message manipulation

No Voice Data Encryption ✓ ✓ ✓ ✓ ✓ Wiretapping

: Vulnerable : Secure

Page 39: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

No authentication

– Make a call with a fake number

No session management

– Send multiple INVITE messages

Several call sessions are established

– In a normal call, one user can call to only one person

For each call session, high-cost bearer is established

– Even one sender can deplete resources of the core network

No Authentication/Session Management

42

Weak Point Vulnerability US-1 US-2 KR-1 KR-2 KR-3 Possible Attack

IMSNo Authentication X X O O X Caller Spoofing

No Session Management O O O X O Denial of Service on Core Network

: Vulnerable : Secure

Page 40: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Header : phone # of caller/callee, …Body : IP addr, port no., …

INVITE

Header : phone # of caller/callee, …Body : IP addr, port no., …

INVITE

IMS

Caller Spoofing Scenario

43

Caller Callee

Attacker

Page 41: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

44

Page 42: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

IMS Bypassing All voice packets should pass IMS, but

An attacker can bypass SIP servers in IMS

– IMS vulnerabilities are also possible

e.g. Make a call with a fake number

45

Weak Point Vulnerability US-1 US-2 KR-1 KR-2 KR-3 Possible Attack

4G-GW IMS Bypassing O X O X X Caller Spoofing

4G Gateway

IMS

: Vulnerable : Secure

Page 43: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Android Permission Model Mismatch No distinction between a phone call and a normal data socket

– An app needs “android.permission.CALL_PHONE”

– In VoLTE, we found that an app can call with “android.permission.INTERNET”

A malicious app only with Internet permission can perform

– Denial of service attack on call

– Overbilling attack by making an expensive video call

46

Weak Point Vulnerability US-1 US-2 KR-1 KR-2 KR-3 Possible Attack

Phone Permission Mismatch Vulnerable for all Android Denial of Service on Call, Overbilling

Page 44: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Denial of Service on Call Scenario Blocking an incoming call Cutting off an ongoing call

47

Victim

Attacker

Caller

Victim

Attacker

Caller

Cut-off

IMSIMS

Block

Page 45: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

48

Page 46: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

49

Page 47: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Summary Table

50

Weak Point Vulnerability US-1 US-2 KR-1 KR-2 KR-3 Possible Attack

IMS

No SIP Encryption X ✓ ✓ ✓ Message manipulation

No Voice Data Encryption ✓ ✓ ✓ ✓ ✓ Wiretapping

No Authentication X X O O X Caller Spoofing

No Session Management O O O X O Denial of Service on Core Network

4G-GW IMS Bypassing O X O X X Caller Spoofing

Phone Permission Mismatch Vulnerable for all Android Denial of Service on Call, Overbilling

: Vulnerable : Secure

Free Data Channels Free Channel US-1 US-2 KR-1 KR-2 KR-3

Using VoLTE ProtocolSIP Tunneling ✓ ✓ ✓ ✓ ✓

Media Tunneling ✓ ✓ ✓ ✓ ✓

Direct

Communication

Phone to Phone ✓ ✘ ✓ ✘ ✘

Phone to Internet ✘ ✓ ✓ ✘ ✘

Page 48: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Mitigation

51

Point Vulnerability Mitigation Responsible Entity

IMS

No Security Mechanisms IPsec/TLS + SRTP

OperatorsIMS provider

No Authentication Cross-validation of all headers (IP/TCP/SIP)

No Session Management Regulation on call sessions

4G-GW Direct Communication Regulation on direct communication Operators

Phone

Permission Mismatch Strictly binding sockets to data interface Mobile OS (Android)

SIP/Media tunnelingRegulation on packet routingDeep packet inspection (DPI)

Mobile OS (Android)Operators

How to resolve media tunneling? Not easy! Maybe byte-usage accounting?

Page 49: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Discussion Some parts of 3GPP specifications are left to operators

– Several misunderstandings of the operators

– Different implementations and security problems

– Even important security features are only recommendations, not requirement

We reported vulnerabilities to US/KR CERTs, and Google in May

– Google replied “moderate severity”

– All two U.S. operators ACK’ed, but no follow-ups

– Only two among three KR operators have been fixing with us

52

Page 50: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Discussion Some parts of 3GPP specifications are left to operators

– Several misunderstandings of the operators

– Different implementations and security problems

– Even important security features are only recommendations, not requirement

We reported vulnerabilities to US/KR CERTs, and Google in May

– Google replied “moderate severity”

– All two U.S. operators ACK’ed, but no follow-ups

– Only two among three KR operators have been fixing with us

52

Page 51: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Discussion Some parts of 3GPP specifications are left to operators

– Several misunderstandings of the operators

– Different implementations and security problems

– Even important security features are only recommendations, not requirement

We reported vulnerabilities to US/KR CERTs, and Google in May

– Google replied “moderate severity”

– All two U.S. operators ACK’ed, but no follow-ups

– Only two among three KR operators have been fixing with us

52

Page 52: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Is VoIP Secure Enough?

53

What if VoLTE is interconnected with VoIP?

Page 53: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Conclusion Newly adopted VoLTE has

– A complex (legacy time-based) accounting– Delegated voice signal (previously done by CP) to AP

We analyzed the security of VoLTE for 5 operators, and found– Four free data channels

– Five security problems

All related parties have problems– 3GPP, telcos, IMS providers, mobile OSes, and device vendors

More and more reliance on cellular technology– Automobiles, power grid, traffic signal, ...

Holistic re-evaluation of security for VoLTE?

54

Page 54: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

55

Thank You!Any questions?

[email protected]@kaist.ac.kr

Page 55: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

APPENDIX

56

Page 56: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

VoLTE procedure

eNodeB MMES/P-

GW

Radio setup

EPS Registration, default bearer setup

IMS registration and user authentication

IMS VoIP session setup

EPS dedicated bearer setup

Media Session

IMS VoIP session and dedicated bearer release

Media

Proxy

SIP

server

1

2

3

4

5

6

7

IMS

Page 57: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

SIP Signaling Procedure

58

INVITE INVITE

180 Ringing180 Ringing

Voice Session (RTP)

BYE

200 OK

200 OK200 OK

Caller SIP server Callee

Header : Caller & Callee’s phone #, route,…Body : Voice session info (callee -> caller) (Callee’s phone #, src voice IP, port)

BYE

200 OK

Header : Caller & Callee’s phone #, route,…Body : Voice session info

Header : Caller & Callee’s phone #, route,…Body : Voice session info (callee -> caller)

Page 58: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Empirical Analysis

59

US-1 US-2 KR-1 KR-2 KR-3

Network protocol IPv6 IPv6 + IPsec IPv4 IPv4 IPv6

Transport protocol for SIP TCP & UDP TCP & UDP UDP UDP UDP

Encryption algorithm for IPsec - AES - - -

Capability of changing SIP source port ✓ ✘ ✓ ✓ ✓

Existence of a media proxy ✘ ✓ ✘ ✓ ✓

Sending random data through media session ✓ ✓ ✓ ✓ ✓

Free use of audio channel ✓ ✓ ✓ ✓ ✓

Page 59: Dissecting VoLTE: Exploiting Free Data Channels and ... · PDF fileDissecting VoLTE: Exploiting Free Data ... In LTE, all services are ... –An attacker can easily manipulate VoLTE

Detailed Results of Media Tunneling Media channel characteristics from the control plane messages

Actual measurement results (trade-offs between throughput and loss rate)

US-1 US-2 KR-1 KR-2 KR-3

QoS Param. (Kbps) 38 49 41 41 49

Bandwidth (Kbps) 38/49 49 65 65 65

Latency (sec) 0.1 0.1 0.1 0.1 0.1

Loss rate (%) 1 1 1 1 1

US-1 US-2 KR-1 KR-2 KR-3

Throughput (Kbps) 37.90 36.93 45.76 39 50.48

Latency (sec) 0.52 0.02 0.10 0.32 0.30

Loss rate (%) 1.44 1.74 0.77 0.65 0.73

60