{
	"id": "c518e2bd-dcb1-4ab9-9254-4228750fb213",
	"created_at": "2026-04-06T02:11:14.121413Z",
	"updated_at": "2026-04-10T13:11:50.268071Z",
	"deleted_at": null,
	"sha1_hash": "e722f9e6fe2566c5f78d05213a9a86e50ab0e0b0",
	"title": "CEL-36 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41833,
	"plain_text": "CEL-36 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 01:35:01 UTC\r\nMobile Threat Catalogue\r\nUnauthorized Phone Call and SMS Rerouting\r\nContribute\r\nThreat Category: Carrier Infrastructure\r\nID: CEL-36\r\nThreat Description: Network control data compromises can enable intruders to reroute calls and Short Message\r\nService (SMS) data.\r\nThreat Origin\r\n3G Security: Security Threats and Requirements (Release 4) 1\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nReferences\r\n1. 3G Security; Security Threats and Requirements (Release 4), 3GPP TS 21.133 V4.0.0, 3rd Generation\r\nPartnership Project, 2003; www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/Old_Vsns/21133-400.pdf\r\n[Accessed 8/23/2016] ↩\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-36.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-36.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-36.html"
	],
	"report_names": [
		"CEL-36.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775441474,
	"ts_updated_at": 1775826710,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e722f9e6fe2566c5f78d05213a9a86e50ab0e0b0.pdf",
		"text": "https://archive.orkl.eu/e722f9e6fe2566c5f78d05213a9a86e50ab0e0b0.txt",
		"img": "https://archive.orkl.eu/e722f9e6fe2566c5f78d05213a9a86e50ab0e0b0.jpg"
	}
}