Home MME

4.2.2.2.1 Access with 2G SIM forbidden

Home MME18.0.0
33116-h00    33116-i00
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

2G SIM access forbidden

Requirement Reference

TBA

Requirement Description

"Access to E-UTRAN with a 2G SIM or a SIM application on a UICC shall not be granted." as specified in TS 33.401, clause 6.1.1.

Test Purpose

Verify that access to EPS with a 2G SIM is not possible.

Pre-Conditions

Test environment with HSS. HSS may be simulated.

Execution Steps

Include 2G authentication vector in authentication data response from HSS.

Expected Results

MME rejects UE authentication when receiving 2G authentication vector from HSS.

NOTE: When both MME and HSS function correctly 2G authentication vector are never included in authentication data response from HSS to MME.

Expected Format of Evidence
PDFs 63a57bfef7c3a5935a6a0e0b060c3998

4.2.2.2.2 Re-synchronization

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Inclusion of RAND, AUTS

Requirement Reference

TBA

Requirement Description

"In the case of a synchronization failure, the MME shall also include RAND and AUTS." as specified in TS 33.401, clause 6.1.2.

Test Purpose

Verify that Re-synchronization procedure works correctly.

Pre-Conditions

Test environment with UE and HSS. UE and HSS may be simulated.

Execution Steps

The MME receives an AUTHENTICATION FAILURE message, with the EMM cause #21 "synch failure" and a re‑synchronization token AUTS.

Expected Results

The MME includes the stored RAND and the received AUTS in the authentication data request to the HSS.

NOTE: When RAND and AUTS are not included in the authentication data request to the HSS then the HSS will return a new authentication vector (AV) based on its current value of the sequence number SQN~HE~ (cf. TS 33.102, clause 6.3.5) A new authentication procedure between MME and UE using this new AV will be successful just the same if the cause of the synchronisation failure was the sending of a "stale" challenge, i.e. one that the UE had seen before or deemed to be too old. But if the cause of the synchronisation failure was a problem with the sequence number SQN~HE~ in the HSS (which should be very rare), and the RAND and AUTS are not included in the authentication data request to the HSS, then an update of SQN~HE~ based on AUTS will not occur in the HSS, and the new authentication procedure between MME and UE using the new AV will fail again. This can be considered a security-relevant failure case as it may lead to a subscriber being shut out from the system permanently.

Expected Format of Evidence
PDFs bf5422bfe275bd679d3f0f757a8838fb

4.2.2.2.3 Integrity check of Attach message

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Integrity check of Attach message

Requirement Reference

TBA

Requirement Description

"If the user cannot be identified or the integrity check fails, then the MME shall send a response indicating that the user identity cannot be retrieved." as specified in TS 33.401, clause 6.1.4.

Test Purpose

Verify that secure user identification by means of integrity check of Attach request works correctly.

Pre-Conditions

Test environment with new and old MME. New MME may be simulated.

Execution Steps

The old MME receives an Identification Request message from the new MME with incorrect integrity protection.

Expected Results

The old MME sends a response indicating that the user identity cannot be retrieved.

Expected Format of Evidence
PDFs f6f84b8ef34807fa19f18e6bc1cda058

4.2.2.2.4 Not forwarding EPS authentication data to SGSN

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Not forwarding EPS authentication data to SGSN

Requirement Reference

TBA

Requirement Description

"EPS authentication data shall not be forwarded from an MME towards an SGSN." as specified in TS 33.401, clause 6.1.4.

Test Purpose

Verify that EPS authentication data remains in the EPC.

Pre-Conditions

Test environment with MME and SGSN. SGSN may be simulated.

Execution Steps

The MME receives an Identification Request message from the SGSN.

Expected Results

The response to the SGSN does not include EPS authentication data.

Expected Format of Evidence
PDFs 5998f5eb708097713296dc64e37e06c4

4.2.2.2.5 Not forwarding unused EPS authentication data between different security domains

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Not forwarding unused EPS authentication between different security domains

Requirement Reference

TBA

Requirement Description

"Unused EPS authentication vectors, or non-current EPS security contexts, shall not be distributed between MMEs belonging to different serving domains (PLMNs)." as specified in TS 33.401, clause 6.1.5.

Test Purpose

Verify that unused EPS authentication data remains in the same serving domain.

Pre-Conditions

Test environment with old and new MME in different serving domains. New MME may be simulated.

Execution Steps

The old MME receives an Identification Request message from the new MME.

Expected Results

The response to the new MME does not include unused EPS authentication data.

Expected Format of Evidence
PDFs 791c5d9a146b0439289081cd691d39d1

4.2.2.3.1 Bidding down prevention

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Bidding down prevention

Requirement Reference

TBA

Requirement Description

"The SECURITY MODE COMMAND shall include the replayed security capabilities of the UE." as specified in TS 33.401, clause 7.2.

Test Purpose

Verify that bidding down by eliminating certain UE capabilities on the interface from UE to MME is not possible.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

Attach request message includes security capabilities of the UE.

Expected Results

MME includes the same security capabilities of the UE in the SECURITY MODE COMMAND message.

Expected Format of Evidence
PDFs 88c780c6484314eb1e50e19b1aa441f8

4.2.2.3.2 NAS integrity algorithm selection and use

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

NAS integrity algorithm selection

Requirement Reference

TBA

Requirement Description

"The MME shall protect the SECURITY MODE COMMAND message with the integrity algorithm, which has the highest priority according to the ordered lists." as specified in TS 33.401, clause 7.2.4.3.1."

NOTE: The text in TS 33.401, clause 7.2.4.3.1 is somewhat incomplete. It should properly read: "...which has the highest priority according to the ordered lists and is contained in the UE EPS security capabilities."

Test Purpose

Verify that NAS integrity protection algorithm is selected and applied correctly.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

The MME sends the SECURITY MODE COMMAND message. The UE replies with the SECURITY MODE COMPLETE message.

Expected Results
  1. The MME has selected the integrity algorithm which has the highest priority according to the ordered lists and is contained in the UE EPS security capabilities. The MME checks the message authentication code on the SECURITY MODE COMPLETE message.

  2. The MAC in the SECURITY MODE COMPLETE is verified, and the NAS integrity protection algorithm is selected and applied correctly.

Expected Format of Evidence
PDFs f8a427728e562ad28462e8d52cbdf9f5

4.2.2.3.3 NAS NULL integrity protection

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

NAS NULL integrity protection

Requirement Reference

TBA

Requirement Description

"EIA0 shall only be used for unauthenticated emergency calls." as specified in TS 33.401, clause 5.1.4.1."

Test Purpose

Verify that NAS NULL integrity protection algorithm is used correctly.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

The MME sends the SECURITY MODE COMMAND message after successful UE authentication.

Expected Results

The selected integrity algorithm is different from EIA0.

Expected Format of Evidence
PDFs 6d731999c5d75683da1aef298e64500c

4.2.2.3.4 NAS confidentiality protection

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

NAS confidentiality protection

Requirement Reference

TBA

Requirement Description

"The UE...sends the NAS security mode complete message to MME ciphered and integrity protected." as specified in TS 33.401, clause 7.2.4.3.1."

Test Purpose

Verify that NAS confidentiality protection algorithm is applied correctly.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

The MME receives the SECURITY MODE COMPLETE message without confidentiality protection.

Expected Results

If a confidentiality algorithm different from EEA0 was selected the MME rejects the message.

Expected Format of Evidence
PDFs 1a78c9e5e7d01c1b96d8bde3ce88bcd9

4.2.2.4.1 Bidding down prevention in X2-handovers

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Bidding down prevention in X2-handovers

Requirement Reference

TBA

Requirement Description

"The MME shall verify that the UE EPS security capabilities received from the eNB are the same as the UE EPS security capabilities that the MME has stored." as specified in TS 33.401, clause 7.2.4.2.2."

Test Purpose

Verify that bidding down is prevented in X2-handovers.

Pre-Conditions

Test environment with (target) eNB. eNB may be simulated.

The MME is configured to log the event of a UE EPS security capability mismatch.

Execution Steps

The MME receives the path-switch message with the UE EPS security capabilities different from the ones stored in the MME for that UE.

Expected Results

The MME logs the event.

Expected Format of Evidence
PDFs 63a9aa421017b0d78479e69f4c8d418f

4.2.2.4.2 NAS integrity protection algorithm selection in MME change

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

NAS integrity protection algorithm selection in MME change

Requirement Reference

TBA

Requirement Description

"In case there is change of MMEs and algorithms to be used for NAS, the target MME shall initiate a NAS security mode command procedure and include the chosen algorithms and the UE security capabilities (to detect modification of the UE security capabilities by an attacker) in the message to the UE (see clause 7.2.4.4). The MME shall select the NAS algorithms which have the highest priority according to the ordered lists (see clause 7.2.4.3.1)." as specified in TS 33.401, clause 7.2.4.3.2."

Test Purpose

Verify that NAS integrity protection algorithm is selected correctly.

Pre-Conditions

Test environment with source and target MME. Source MME may be simulated.

Execution Steps

The target MME receives the UE EPS security capabilities and the NAS algorithms used by the source MME from the source MME over the S10 interface. The target MME selects the NAS algorithms which have the highest priority according to the ordered lists. The lists are assumed such that the algorithms selected by the target MME are different from the ones received from the source MME.

Expected Results

The target MME initiates a NAS security mode command procedure and include the chosen algorithms and the UE security capabilities.

Expected Format of Evidence
PDFs c7ea016f2d0541676a96ca67649c1fad

4.2.2.5.1 No access with 2G SIM via idle mode mobility

Home MME18.0.0
33116-h00    33116-i00
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Idle mode mobility into E-UTRAN forbidden for GSM subscribers

Requirement Reference

TBA

Requirement Description

"In case the MM context in the Context Response/SGSN Context Response indicates GSM security mode, the MME shall abort the procedure." as specified in TS 33.401, clause 9.1.2.

Test Purpose

Verify that 2G subscribers cannot obtain service in EPS via idle mode mobility.

Pre-Conditions

Test environment with source SGSN and target MME. Source SGSN may be simulated.

Execution Steps

The target MME receives the MM context in the Context Response indicating GSM security mode.

Expected Results

The MME aborts the procedure by acknowledging the Context Response from the SGSN with an appropriate failure cause.

Expected Format of Evidence
PDFs 02372a25d84cec3ce7f9c042b526c45a

4.2.2.5.2 No access with 2G SIM via handover

Home MME18.0.0
33116-h00    33116-i00
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Handover into E-UTRAN forbidden for GSM subscribers

Requirement Reference

TBA

Requirement Description

"In case the MM context in the Forward relocation request message indicates GSM security mode (i.e. it contains a Kc), the MME shall abort the non-emergency call procedure." as specified in TS 33.401, clause 9.2.2.

Test Purpose

Verify that GSM subscribers cannot obtain service in EPS via handovers.

Pre-Conditions

Test environment with source SGSN and target MME. Source SGSN may be simulated.

Execution Steps

The target MME receives the MM context in the Forward Location Request message indicating GSM security mode.

Expected Results

The MME aborts the procedure by responding to the Forward Relocation Request from the SGSN with an appropriate failure cause.

Expected Format of Evidence
PDFs 5a74d5685d1983509af9fa62c337a8fc

4.2.2.5.3 No access with 2G SIM via SRVCC

Home MME18.0.0
33116-h00    33116-i00
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

SRVCC into E-UTRAN forbidden for GSM subscribers

Requirement Reference

TBA

Requirement Description

"If the MME receives a GPRS Kc' from the source MSC server enhanced for SRVCC in the CS to PS HO request, the MME shall reject the request." as specified in TS 33.401, clause 14.3.1.

Test Purpose

Verify that GSM subscribers cannot obtain service in EPS via SRVCC into E-UTRAN.

Pre-Conditions

Test environment with source MSC server and target MME. Source MSC server may be simulated.

Execution Steps

The target MME receives the GPRS Kc' and the CKSN'~PS~ in the CS to PS handover request.

Expected Results

The MME rejects the request.

Expected Format of Evidence
PDFs 37ff4f7b218a281d87d54a4175129e58

4.2.2.6.1 Authentication failure for emergency bearers

Home MME18.0.0
33116-h00    33116-i00 33116-j00  
Test Name
Threat Reference

TBA

Security Objective References: TBA

Requirement Name

Emergency bearer establishment when authentication fails

Requirement Reference

TS 33.401 [5], clause 15.1.

Requirement Description

"The MME or UE shall always release any established non-emergency bearers, when the authentication fails in the UE or in the MME." as specified in TS 33.401, clause 15.1.

Test Purpose

Ensure that the MME enforces that only emergency bearers can be used without successful authentication.

Pre-Conditions

Test environment with MME and UE. UE may be simulated. The serving network policy allows unauthenticated IMS Emergency Sessions.

Execution Steps

The UE sends the initial attach request for EPS emergency bearer services, then the MME initiates an authentication, which fails. The UE attached for EPS emergency bearer services sends the PDN Connectivity request for EPS non-emergency bearer services.

Expected Results

The MME allows to continue the set up of the emergency bearer, and will reject the PDN Connectivity request for EPS non-emergency bearer services.

Expected Format of Evidence
PDFs 62d4391d026e9b48038f5343c98be94c