Berserker: ASN.1-based Fuzzing of Radio Resource Control Protocol for 4G and 5G

Srinath Potnuru,Prajwol Kumar Nakarmi
DOI: https://doi.org/10.1109/WiMob52687.2021.9606317
2021-12-02
Abstract:Telecom networks together with mobile phones must be rigorously tested for robustness against vulnerabilities in order to guarantee availability. RRC protocol is responsible for the management of radio resources and is among the most important telecom protocols whose extensive testing is warranted. To that end, we present a novel RRC fuzzer, called Berserker, for 4G and 5G. Berserker's novelty comes from being backward and forward compatible to any version of 4G and 5G RRC technical specifications. It is based on RRC message format definitions in ASN.1 and additionally covers fuzz testing of another protocol, called NAS, tunneled in RRC. Berserker uses concrete implementations of telecom protocol stack and is unaffected by lower layer protocol handlings like encryption and segmentation. It is also capable of evading size and type constraints in RRC message format definitions. Berserker discovered two previously unknown serious vulnerabilities in srsLTE -- one of which also affects openLTE -- confirming its applicability to telecom robustness.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to ensure the robustness of the RRC (Radio Resource Control) protocol and its encapsulated NAS (Non - Access Stratum) protocol in 4G and 5G telecommunication networks. Specifically: 1. **Ensuring high availability**: Telecommunication networks need to guarantee 99.999% availability (i.e., the downtime within one year is no more than 6 minutes). Therefore, these networks must be strictly tested to ensure their robustness in the face of various vulnerabilities. 2. **Importance of the RRC protocol**: The RRC protocol, which is a Layer 3 protocol, is responsible for managing the radio resources between mobile phones and base stations. If RRC messages are not properly processed, it will lead to communication interruption and affect user services. In addition, the RRC protocol also encapsulates the NAS protocol, which means that RRC messages not only affect the base station but also other parts of the network. 3. **Limitations of existing fuzz - testing tools**: Most of the existing fuzz - testing tools are aimed at general - purpose IP protocols (such as HTTP, SIP, etc.) and are not suitable for the RRC protocol. RRC messages are binary - encoded and encapsulated in lower - layer protocols. Using general - purpose fuzz - testing tools will almost always generate invalid messages and even be discarded before reaching Layer 3. 4. **Version compatibility issues**: Existing RRC fuzz - testing tools are usually based on specific versions of 3GPP Technical Specifications (TS), which makes them unable to be backward or forward - compatible with different versions of RRC message formats. As 3GPP TS is constantly updated, these tools will soon become obsolete. To solve the above problems, the paper proposes a new RRC fuzz - testing tool named Berserker, which has the following features: - **Backward and forward - compatible**: Berserker can directly extract ASN.1 schema definitions from any version of 3GPP RRC TS, thereby achieving backward and forward - compatibility with 4G and 5G RRC message formats. - **Constraint avoidance**: Berserker can avoid size and type constraints in RRC message formats by modifying the ASN.1 schema itself, thereby generating a wider range of test cases. - **Unaffected by lower - layer protocol processing**: Berserker intercepts and fuzzifies RRC messages by inserting an additional intermediate layer in the specific telecommunication protocol stack implementation, thereby avoiding the influence of lower - layer protocol processing (such as encryption, integrity protection, segmentation, etc.). Through these features, Berserker can effectively discover potential vulnerabilities in the RRC and NAS protocols and ensure the security and reliability of telecommunication networks. The paper verifies the effectiveness of Berserker through evaluation on the open - source project srsLTE and discovers two previously unknown serious vulnerabilities.