Invade the Walled Garden: Evaluating GTP Security in Cellular Networks

May 12, 2025·
Yiming Zhang
,
Tao Wan
Yaru Yang
Yaru Yang
,
Haixin Duan
,
Yichen Wang
,
Jianjun Chen
,
Zixiang Wei
,
Xiang Li
· 0 min read
PDF
Abstract
Cellular backhaul and core networks have traditionally been considered as Walled Garden, with their security ensured by physical isolation. Therefore, prior security studies primarily focused on radio access networks with limited treatment of backhaul and core network interfaces. In this paper, we performed a security evaluation of real-world GPRS Tunnelling Protocol (GTP) deployments. GTP is the fundamental protocol for user traffic management between base stations and core networks (inside the Walled Garden) from 3G to 5G, thus often assumed inaccessible and non-exploitable from the Internet. However, our study reveals for the first time the troubling state of GTP access control in real-world deployments. Aided by a semi-automated tool, our measurements discovered around 749,000 valid GTP hosts accessible via the public Internet, spanning across 1,176 service providers in 162 countries. Our results demonstrate potential exposure of mobile core network infrastructures to external threats. We then evaluated the attack surface of exposed GTP infrastructures, and found out that as many as 38 types of GTP messages can be misused to launch various attacks such as denial-of-service and session hijacking. Our experiments using open source 4G and 5G projects in isolated lab environments further confirm the feasibility of those GTP-based attacks, including remote hijacking of user traffic sent through cellular core networks. In addition to threats against cellular networks and their subscribers, exposed GTP devices could also be weaponized to launch large-scale reflective denial-of-services (RDoS) attacks. We hope our findings will increase awareness of GTP vulnerabilities among operators and the security community, highlighting the urgent need to further strengthen security in cellular core networks.
Type
Publication
IEEE Symposium on Security and Privacy 2025
Authors
Yaru Yang
Authors
Yaru Yang is a PhD student at Tsinghua University, majoring in Cyberspace Security. His research focuses on cellular network security, including IMS security, femtocell security, and core network security. His work has been published or accepted at leading academic conferences such as NDSS, IEEE S&P, DSN, and WiSec. He is also a CTF player and the former captain of Team Redbud, focusing on pwn, reverse, and misc challenges. He has won awards at competitions such as GeekPwn, GeekCon, WACON, and XCTF.
Authors