A critical authentication bypass vulnerability exists in the 5G Core Network Function (NF) authentication mechanism. Attackers can exploit this flaw to gain unauthorized access to network slices and subscriber data by sending specially crafted authentication requests that bypass the 5G-AKA protocol validation.
Complete compromise of 5G network authentication, potential access to all subscriber data, network slice isolation bypass, and possible service disruption affecting millions of users.
Immediately upgrade to version 2.4.0 or later. Implement additional network segmentation and monitor for unusual authentication patterns. Deploy intrusion detection systems specifically configured for 5G Core traffic.