{
	"id": "3eacf2ea-f3cd-4ea5-aac5-1cf9e80605e8",
	"created_at": "2026-04-06T01:29:10.290748Z",
	"updated_at": "2026-04-10T13:12:09.924072Z",
	"deleted_at": null,
	"sha1_hash": "06ff7dd000b8032a8717d71e7e32f2e73e395446",
	"title": "CEL-3 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48349,
	"plain_text": "CEL-3 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 00:47:10 UTC\r\nMobile Threat Catalogue\r\nDowngrade Attacks via Rogue Base station\r\nContribute\r\nThreat Category: Cellular Air Interface\r\nID: CEL-3\r\nThreat Description: A rogue base station could force a device to temporarily downgrade its communication\r\nstandard to a previous cellular network generation. This can make the communication more susceptible to security\r\nand privacy issues.\r\nThreat Origin\r\n3G Security: Security Threats and Requirements (Release 4) 1\r\nLTE Architecture Overview and Security Analysis (Draft NISTIR 8017) 2\r\nLTE Security and Protocol Exploits 3\r\nExploit Examples\r\nResearchers exploit cellular tech flaws to intercept phone calls 4\r\nEvery LTE call, text, can be intercepted, blacked out, hacker finds 5\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nOriginal Equipment Manufacturer\r\nEnsure baseband firmware prevents the use of insecure cellular encryption algorithms\r\nMobile Network Operator\r\nUse of application layer encryption technologies\r\nReferences\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html\r\nPage 1 of 2\n\n1. 3G Security; Security Threats and Requirements (Release 4), 3GPP TS 21.133 V4.0.0, 3rd Generation\r\nPartnership Project, 2003; www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/Old_Vsns/21133-400.pdf\r\n[Accessed 8/23/2016] ↩\r\n2. J. Cichonski, J.M. Franklin, and M. Bartock, NIST Special Publication 800-187: Guide to LTE Security,\r\nNational Institute of Standards and Technology, 2017;\r\nhttps://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-187.pdf [Accessed 3/29/2022] ↩\r\n3. R.P. Jover, LTE Security and Protocol Exploits, presented at ShmooCon, 3 Jan. 2016;\r\nwww.ee.columbia.edu/~roger/ShmooCon_talk_final_01162016.pdf [accessed 8/23/2016] ↩\r\n4. J. Vijayan, “Researchers Exploit Cellular Tech Flaws to Intercept Phone Calls”, ComputerWorld, 1 Aug.\r\n2013; http://www.computerworld.com/article/2484538/cybercrime-hacking/researchers-exploit-cellular-tech-flaws-to-intercept-phone-calls.html [accessed 8/23/2016] ↩\r\n5. D. Pauli, “Every LTE call, text, can be intercepted, blacked out, hacker finds”, The Register, 23 Oct 2016;\r\nhttp://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\r\n[accessed 10/26/2016] ↩\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html"
	],
	"report_names": [
		"CEL-3.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775438950,
	"ts_updated_at": 1775826729,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/06ff7dd000b8032a8717d71e7e32f2e73e395446.pdf",
		"text": "https://archive.orkl.eu/06ff7dd000b8032a8717d71e7e32f2e73e395446.txt",
		"img": "https://archive.orkl.eu/06ff7dd000b8032a8717d71e7e32f2e73e395446.jpg"
	}
}