🔒 Trusted by Security Professionals

Telecom Security Vulnerabilities

Comprehensive database of telecommunications vulnerabilities. Search, analyze, and track security threats across 5G, LTE, satellite, and IoT infrastructure.

2,847
CVEs Tracked
312
Critical Severity
127
Vendors Covered
24/7
Updated Daily

Real-Time Security Intelligence

Monitor telecommunications vulnerabilities with comprehensive data and analytics

Total CVEs
10

Across all categories

Critical Severity
2

Immediate action required

High Severity
5

Priority vulnerabilities

Recent CVEs
10

Last 7 days

Severity Distribution
CVEs by severity level
CRITICAL
1
HIGH
1
Recent Vulnerabilities
Latest telecom security vulnerabilities
CVE-2024-0001
CRITICAL
MOBILE

Critical Authentication Bypass in 5G Core Network Function

A critical authentication bypass vulnerability exists in the 5G Core Network Function (NF) authentication mechanism. Attackers can exploit this flaw to gain unauthorized access to network slices and subscriber data by sending specially crafted authentication requests that bypass the 5G-AKA protocol validation.

5/27/2025
CVE-2024-0002
HIGH
MOBILE

Buffer Overflow in LTE Base Station Software

A heap-based buffer overflow vulnerability in LTE base station software allows remote attackers to execute arbitrary code by sending malformed RRC messages. The vulnerability occurs in the message parsing routine when processing oversized information elements.

5/27/2025
CVE-2024-0003
HIGH
SATELLITE

Protocol Injection in Satellite Communication Gateway

A protocol injection vulnerability in satellite communication gateways allows attackers to inject malicious commands into the DVB-S2 protocol stream. This can lead to unauthorized control of satellite transponders and potential service disruption.

5/27/2025
CVE-2024-0004
HIGH
IOT

Default Credentials in IoT Device Management Platform

Multiple IoT devices used in smart city telecommunications infrastructure ship with hardcoded default credentials that cannot be changed through the standard configuration interface. These credentials are identical across all devices and are publicly documented.

5/27/2025
CVE-2024-0005
MEDIUM
PROTOCOLS

SIP Header Injection in VoIP Server

A SIP header injection vulnerability in enterprise VoIP systems allows attackers to inject malicious SIP headers that can lead to call redirection, eavesdropping, and toll fraud. The vulnerability exists in the SIP proxy server component.

5/27/2025
Threat Intelligence Overview
Vulnerability distribution by technology category and threat actors

Technology Categories

NETWORK
1
MOBILE
1

Known Threat Actors

APT-28
1
1 vulnerabilities with unknown attribution

Features

Essential tools for telecommunications security

Advanced Search

Powerful search with filters for severity, vendor, category, and custom queries.

Real-Time Monitoring

Live tracking of emerging vulnerabilities with automated risk assessment.

Analytics Dashboard

Comprehensive analytics with trend analysis and vulnerability patterns.

Smart Alerts

Intelligent notifications for critical vulnerabilities and security updates.

Comprehensive Database

Extensive coverage of telecom vendors, equipment, and infrastructure.

Global Standards

Compliance with international security standards and frameworks.

Trust & Security

Trusted by Security Professionals

Our platform meets the highest security standards and is trusted by leading organizations

ISO 27001

Information Security

Certified

SOC 2 Type II

Security Controls

Compliant

GDPR

Data Protection

Compliant

NIST Framework

Cybersecurity

Aligned

Start Securing Your Infrastructure

Access comprehensive telecommunications vulnerability data.