{"id":35541,"date":"2020-06-15T23:22:07","date_gmt":"2020-06-15T23:22:07","guid":{"rendered":"http:\/\/d1333975-6057-4c7d-8382-5be6e01e37c4"},"modified":"2020-06-15T23:22:07","modified_gmt":"2020-06-15T23:22:07","slug":"old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/","title":{"rendered":"Old GTP protocol vulnerabilities will also impact future 5G networks"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/06\/15\/cbdda67e-2fe7-4f3e-a4a1-e7d47e74c1f0\/telco-5g-mobile-tower.jpg\" class alt=\"telco 5G mobile tower\"><\/span><span class=\"credit\">Image via Maxwell Ingham<\/span> <\/p>\n<p>Vulnerabilities in the GPRS Tunnelling Protocol (GTP) will continue to impact mobile operators even as they migrate to 5G infrastructure.<\/p>\n<p>In reports published <a href=\"https:\/\/positive-tech.com\/storage\/articles\/gtp-2020\/threat-vector-gtp-2020-eng.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">last week<\/a> and in <a href=\"https:\/\/www.a10networks.com\/blog\/gtp-remains-a-5g-security-threat-as-operators-transition-to-5g\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">December 2019<\/a>, cyber-security firms Positive Technologies and A10 Networks detailed a series of vulnerabilities in this legacy mobile protocol. These include:<\/p>\n<ul>\n<li>Disclosure of subscriber information (including location data, used for user tracking)<\/li>\n<li>Spoofing, which can be used for fraud and impersonation attacks<\/li>\n<li>Denial-of-Service (DoS) attacks on network equipment, resulting in mass disruption of mobile communication<\/li>\n<\/ul>\n<p>Researchers say that because mobile providers will have to support the protocol on their 5G networks for legacy reasons, users will remain vulnerable to attacks even if the 5G protocol itself contains security features to prevent similar attacks.<\/p>\n<h3>What is GTP?<\/h3>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/GPRS_Tunnelling_Protocol\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">GTP<\/a>, or the GPRS Tunnelling Protocol, is a mechanism developed to interconnect different networks by creating IP-based tunnels between devices and the mobile network.<\/p>\n<p>The protocol was initially developed as a method of interconnecting different providers of GPRS (2.5G) communications, and allow users to roam across different provider networks, but still have access to features like SMS, MMS, WAP, and others.<\/p>\n<p>As new protocols were developed, such as 3G and 4G (LTE), GTP retained its role inside mobile operators, acting as a liaison between old and new technologies alike.<\/p>\n<p>However, GTP was developed in the early days of internet-capable mobile devices. As with all first-gen protocols, security was not baked into its original design.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>While the protocol can be excused for not supporting encrypted communications in an era when such a feature was not common, GTP also didn&#8217;t support something as basic as &#8220;sender authentication.&#8221;<\/p>\n<p>This means that anyone can send a GTP packet to a mobile telco&#8217;s GTP infrastructure with fake data, and the mobile operator will execute the GTP packet, thinking it&#8217;s legitimate traffic, with no way of verifying it came from one of its legitimate users.<\/p>\n<p>From this basic design flaw, security researchers have, over the past years, discovered different ways to abuse GTP across 2.5G, 3G, 4G, and now, 5G.<\/p>\n<h3>Old GTP issues confirmed in current 5G networks<\/h3>\n<p>In a report published last week, Positive Technologies said it performed security audits of 28 mobile operators in Europe, Asia, Africa, and South America.<\/p>\n<p>The security audits took place in 2018 and 2019, and researchers looked at both 4G and 5G network designs, at multiple protocols, and not just GTP.<\/p>\n<p>Most of the networks they analyzed, were vulnerable to the old GTP attacks, regardless if the telcos were running 4G or 5G setups, Positive Technologies said.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/\" class=\"lazy\" alt=\"gtp-bugs.png\" data-original=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/06\/15\/71ab3bd2-621c-4a8b-af73-0b082e74427a\/gtp-bugs.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/06\/15\/71ab3bd2-621c-4a8b-af73-0b082e74427a\/gtp-bugs.png\" class alt=\"gtp-bugs.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Positive Technologies<\/span><\/p>\n<p>Currently, GTP is used in mixed 4G-5G networks, but the protocol will also be supported on 5G standalone networks, as they begin rolling out.<\/p>\n<p>Positive Technologies says that 5G network operators need to secure their GTP legacy integrations by deploying additional systems that perform subscriber authentication and authorization.<\/p>\n<p>&#8220;GTP security issues will not go away completely even after the transition to 5G Standalone,&#8221; Positive Technologies said.<\/p>\n<p>&#8220;While 5G security is a big step forward, mobile networks will continue to be exposed to GTP threats through roaming partners or prior mobile technologies using GTP,&#8221; A10 Networks said last year. &#8220;Mobile operators will need to deploy a GTP firewall to protect against GTP-based attacks coming in from access networks, roaming partners, IoT, and more to support uninterrupted operations for their networks and subscribers.&#8221;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bugs allow denial-of-service, user impersonation, user tracking, and fraud attacks, two separate reports warn.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35542,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-35541","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Old GTP protocol vulnerabilities will also impact future 5G networks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Old GTP protocol vulnerabilities will also impact future 5G networks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-15T23:22:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Old GTP protocol vulnerabilities will also impact future 5G networks\",\"datePublished\":\"2020-06-15T23:22:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/\"},\"wordCount\":572,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/\",\"name\":\"Old GTP protocol vulnerabilities will also impact future 5G networks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg\",\"datePublished\":\"2020-06-15T23:22:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Old GTP protocol vulnerabilities will also impact future 5G networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Old GTP protocol vulnerabilities will also impact future 5G networks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/","og_locale":"en_US","og_type":"article","og_title":"Old GTP protocol vulnerabilities will also impact future 5G networks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-15T23:22:07+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Old GTP protocol vulnerabilities will also impact future 5G networks","datePublished":"2020-06-15T23:22:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/"},"wordCount":572,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/","url":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/","name":"Old GTP protocol vulnerabilities will also impact future 5G networks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg","datePublished":"2020-06-15T23:22:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks.jpg","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Old GTP protocol vulnerabilities will also impact future 5G networks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35541"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35541\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35542"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}