{"id":201685,"date":"2025-07-30T17:11:05","date_gmt":"2025-07-30T08:11:05","guid":{"rendered":"http:\/\/ee.presscat.kr\/?post_type=research-achieve&#038;p=201685"},"modified":"2026-04-13T03:07:05","modified_gmt":"2026-04-12T18:07:05","slug":"professor-yongdae-kims-team-vulnerability-found-a-single-packet-can-paralyze-smartphones","status":"publish","type":"research-achieve","link":"http:\/\/ee.presscat.kr\/en\/research-achieve\/professor-yongdae-kims-team-vulnerability-found-a-single-packet-can-paralyze-smartphones\/","title":{"rendered":"Professor Yongdae Kim&#8217;s Team Vulnerability Found: A Single Packet Can Paralyze Smartphones"},"content":{"rendered":"<figure id=\"attachment_201686\" aria-describedby=\"caption-attachment-201686\" style=\"width: 916px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-201686\" src=\"http:\/\/ee.presscat.kr\/wp-content\/uploads\/2025\/07\/1.-KAIST-\uae40\uc6a9\ub300-\uad50\uc218-side-1.png\" alt=\"\" width=\"916\" height=\"199\" title=\"\"><figcaption id=\"caption-attachment-201686\" class=\"wp-caption-text\"><span style=\"font-size: 14pt;color: #000000\">&lt;(From left) Professor Yongdae Kim, PhD candidate Tuan Dinh Hoang, PhD candidate Taekkyung Oh from KAIST, Professor CheolJun Park from Kyung Hee University; and Professor Insu Yun from KAIST&gt;<\/span><\/figcaption><\/figure>\n<p><span style=\"font-size: 14pt;color: #000000\">Smartphones must stay connected to mobile networks at all times to function properly.\u00a0The corecomponent that enables this constant connectivity is the communication modem (Baseband) inside the device. KAIST researchers, using their self-developed testing framework called &#8216;LLFuzz (Lower Layer Fuzz),&#8217; have discovered security vulnerabilities in the lower layers of smartphone communication modems and demonstrated the necessity of standardizing &#8216;mobile communication modem security testing.&#8217;\u00a0<span style=\"color: #808080;font-size: 12pt\">*Standardization: In mobile communication, conformance testing, which verifies normal operation in normal situations, has been standardized.<\/span> However, standards for handling abnormal packets have not yet been established, hence the need for standardized security testing.<\/span><\/p>\n<p>&nbsp;<\/p>\n<div><span style=\"font-size: 14pt;color: #000000\">Professor Yongdae Kim&#8217;s team from the School of Electrical Engineering at KAIST, in collaboration with Professor CheolJun Park&#8217;s team from Kyung Hee University, has discovered critical security vulnerabilities in the lower layers of smartphone communication modems. These vulnerabilities can incapacitate smartphone communication with just a single manipulated wireless packet (a data transmission unit in a network). In particular, they are extremely severe, as they can potentially lead to remote code execution (RCE).<\/span><\/div>\n<div>\u00a0<\/div>\n<p><span style=\"font-size: 14pt;color: #000000\">The research team utilized their self-developed &#8216;LLFuzz&#8217; analysis framework to analyze the lower layer state transitions and error handling logic of the modem to detect security vulnerabilities. LLFuzz was able to precisely extract vulnerabilities caused by implementation errors by comparing and analyzing <span style=\"color: #808080;font-size: 12pt\">3GPP* standard-based state machines with actual device responses.\u00a0*3GPP: An international collaborative organization that creates global mobile communication standards.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">The research team conducted experiments on 15 commercial smartphones from global manufacturers, including Apple, Samsung Electronics, Google, and Xiaomi, and discovered a total of 11 vulnerabilities. Among these, seven were assigned official CVE (Common Vulnerabilities and Exposures) numbers, and manufacturers applied security patches for these vulnerabilities. However, the remaining four have not yet been publicly disclosed.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">While previous security research primarily focused on higher layers of mobile communication, such as NAS (Network Access Stratum) and RRC (Radio Resource Control), the research team concentrated on analyzing the error handling logic of mobile communication&#8217;s lower layers, which manufacturers have often neglected<\/span><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_201690\" aria-describedby=\"caption-attachment-201690\" style=\"width: 1032px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-201690\" src=\"http:\/\/ee.presscat.kr\/wp-content\/uploads\/2025\/07\/\uadf8\ub9bc-1.-LLFuzz-\uc2dc\uc2a4\ud15c-\uad6c\uc131\ub3c4\uc601-1.jpg\" alt=\"\" width=\"1032\" height=\"305\" title=\"\"><figcaption id=\"caption-attachment-201690\" class=\"wp-caption-text\"><span style=\"font-size: 12pt;color: #000000\">&lt;LLFuzz Design&gt;<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">These vulnerabilities occurred in the lower layers of the communication modem (RLC, MAC, PDCP, PHY*), and due to their structural characteristics where encryption or authentication is not applied, operational errors could be induced simply by injecting external signals.\u00a0<span style=\"color: #808080;font-size: 12pt\">*RLC, MAC, PDCP, PHY: Lower layers of LTE\/5G communication, responsible for wireless resource allocation, error control, encryption, and physical layer transmission.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">The research team released a demo video showing that when they injected a manipulated wireless packet (malformed MAC packet) into commercial smartphones via a Software-Defined Radio (SDR) device using packets generated on an experimental laptop, the smartphone&#8217;s communication modem (Baseband) immediately crashed<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">\u203b Experiment video:\u00a0<a style=\"color: #000000\" href=\"https:\/\/drive.google.com\/file\/d\/1NOwZdu_Hf4ScG7LkwgEkHLa_nSV4FPb_\/view?usp=drive_link\" target=\"_blank\" rel=\"noopener\">https:\/\/drive.google.com\/file\/d\/1NOwZdu_Hf4ScG7LkwgEkHLa_nSV4FPb_\/view?usp=drive_link<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">The video shows data being normally transmitted at 23MB per second on the fast.com page, but immediately after the manipulated packet is injected, the transmission stops and the mobile communication signal disappears. This intuitively demonstrates that a single wireless packet can cripple a commercial device&#8217;s communication modem.<\/span><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_201692\" aria-describedby=\"caption-attachment-201692\" style=\"width: 1019px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-201692\" src=\"http:\/\/ee.presscat.kr\/wp-content\/uploads\/2025\/07\/images_000103_Discovered_vulnerabilities_across_different_vendors_and_protocol_layers.png\" alt=\"\" width=\"1019\" height=\"403\" title=\"\"><figcaption id=\"caption-attachment-201692\" class=\"wp-caption-text\"><span style=\"font-size: 12pt;color: #000000\">&lt;LTE Vulnerability Summary&gt;<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">The vulnerabilities were found in the &#8216;modem chip,&#8217; a core component of smartphones responsible for calls, texts, and data communication, making it a very important component.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"font-size: 14pt;color: #000000\">Qualcomm: Affects over 90 chipsets, including CVE-2025-21477, CVE-2024-23385.<\/span><\/li>\n<li><span style=\"font-size: 14pt;color: #000000\">MediaTek: Affects over 80 chipsets, including CVE-2024-20076, CVE-2024-20077, CVE-2025-20659.<\/span><\/li>\n<li><span style=\"font-size: 14pt;color: #000000\">Samsung: CVE-2025-26780 (targets the latest chipsets like Exynos 2400, 5400).<\/span><\/li>\n<li><span style=\"font-size: 14pt;color: #000000\">Apple: CVE-2024-27870 (shares the same vulnerability as Qualcomm CVE).<\/span><\/li>\n<li>\u00a0<\/li>\n<\/ul>\n<p><span style=\"font-size: 14pt;color: #000000\">The problematic modem chips (communication components) are not only in premium smartphones but also in low-end smartphones, tablets, smartwatches, and IoT devices, leading to the widespread potential for user harm due to their broad diffusion.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">Furthermore, the research team experimentally tested 5G vulnerabilities in the lower layers and found two vulnerabilities in just two weeks. Considering that 5G vulnerability checks have not been generally conducted, it is possible that many more vulnerabilities exist in the mobile communication lower layers of baseband chips.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">Professor Yongdae Kim explained, &#8220;The lower layers of smartphone communication modems are not subject to encryption or authentication, creating a structural risk where devices can accept arbitrary signals from external sources.&#8221; He added, &#8220;This research demonstrates the necessity of standardizing mobile communication modem security testing for smartphones and other IoT devices.&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">The research team is continuing additional analysis of the 5G lower layers using LLFuzz and is also developing tools for testing LTE and 5G upper layers. They are also pursuing collaborations for future tool disclosure. The team&#8217;s stance is that &#8220;as technological complexity increases, systemic security inspection systems must evolve in parallel.&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">First author Tuan Dinh Hoang, a Ph.D. student in the School of Electrical Engineering, will present the research results in August at USENIX Security 2025, one of the world&#8217;s most prestigious conferences in cybersecurity.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">\u203b Paper Title: LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers (Tuan Dinh Hoang and Taekkyung Oh, KAIST; CheolJun Park, Kyung Hee Univ.; Insu Yun and Yongdae Kim, KAIST)<\/span><\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">\u203b\u00a0Lab homepage paper:\u00a0<a style=\"color: #000000\" href=\"https:\/\/syssec.kaist.ac.kr\/pub\/2025\/LLFuzz_Tuan.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/syssec.kaist.ac.kr\/pub\/2025\/LLFuzz_Tuan.pdf<\/a><\/span><\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">\u203b Open-source repository:\u00a0<a style=\"color: #000000\" href=\"https:\/\/www.google.com\/search?q=https:\/\/github.com\/SysSec-KAIST\/LLFuzz\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/SysSec-KAIST\/LLFuzz<\/a>\u00a0(To be released)<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">This research was conducted with support from the Institute of Information &amp; Communications Technology Planning &amp; Evaluation (IITP) funded by the Ministry of Science and ICT.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>263<\/p>\n","protected":false},"featured_media":201695,"template":"","research_category":[347],"class_list":["post-201685","research-achieve","type-research-achieve","status-publish","has-post-thumbnail","hentry","research_category-ai-machine-learning-en"],"acf":[],"_links":{"self":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research-achieve\/201685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research-achieve"}],"about":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/types\/research-achieve"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media\/201695"}],"wp:attachment":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media?parent=201685"}],"wp:term":[{"taxonomy":"research_category","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research_category?post=201685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}