4.2.2.2.1 Access with 2G SIM forbidden |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | 2G SIM access forbidden |
|
| Requirement Reference | TBA |
|
| Requirement Description | "Access to E-UTRAN with a 2G SIM or a SIM application on a UICC shall not be granted." as specified in TS 33.401, clause 6.1.1. |
|
| Test Purpose | Verify that access to EPS with a 2G SIM is not possible. |
|
| Pre-Conditions | Test environment with HSS. HSS may be simulated. |
|
| Execution Steps | Include 2G authentication vector in authentication data response from HSS. |
|
| Expected Results | MME rejects UE authentication when receiving 2G authentication vector from HSS.
|
|
| Expected Format of Evidence | ||
| PDFs | 63a57bfef7c3a5935a6a0e0b060c3998 | |
4.2.2.2.2 Re-synchronization |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Inclusion of RAND, AUTS |
|
| Requirement Reference | TBA |
|
| Requirement Description | "In the case of a synchronization failure, the MME shall also include RAND and AUTS." as specified in TS 33.401, clause 6.1.2. |
|
| Test Purpose | Verify that Re-synchronization procedure works correctly. |
|
| Pre-Conditions | Test environment with UE and HSS. UE and HSS may be simulated. |
|
| Execution Steps | The MME receives an AUTHENTICATION FAILURE message, with the EMM cause #21 "synch failure" and a re‑synchronization token AUTS. |
|
| Expected Results | The MME includes the stored RAND and the received AUTS in the authentication data request to the HSS.
|
|
| Expected Format of Evidence | ||
| PDFs | bf5422bfe275bd679d3f0f757a8838fb | |
4.2.2.2.3 Integrity check of Attach message |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Integrity check of Attach message |
|
| Requirement Reference | TBA |
|
| Requirement Description | "If the user cannot be identified or the integrity check fails, then the MME shall send a response indicating that the user identity cannot be retrieved." as specified in TS 33.401, clause 6.1.4. |
|
| Test Purpose | Verify that secure user identification by means of integrity check of Attach request works correctly. |
|
| Pre-Conditions | Test environment with new and old MME. New MME may be simulated. |
|
| Execution Steps | The old MME receives an Identification Request message from the new MME with incorrect integrity protection. |
|
| Expected Results | The old MME sends a response indicating that the user identity cannot be retrieved. |
|
| Expected Format of Evidence | ||
| PDFs | f6f84b8ef34807fa19f18e6bc1cda058 | |
4.2.2.2.4 Not forwarding EPS authentication data to SGSN |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Not forwarding EPS authentication data to SGSN |
|
| Requirement Reference | TBA |
|
| Requirement Description | "EPS authentication data shall not be forwarded from an MME towards an SGSN." as specified in TS 33.401, clause 6.1.4. |
|
| Test Purpose | Verify that EPS authentication data remains in the EPC. |
|
| Pre-Conditions | Test environment with MME and SGSN. SGSN may be simulated. |
|
| Execution Steps | The MME receives an Identification Request message from the SGSN. |
|
| Expected Results | The response to the SGSN does not include EPS authentication data. |
|
| Expected Format of Evidence | ||
| PDFs | 5998f5eb708097713296dc64e37e06c4 | |
4.2.2.2.5 Not forwarding unused EPS authentication data between different security domains |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Not forwarding unused EPS authentication between different security domains |
|
| Requirement Reference | TBA |
|
| Requirement Description | "Unused EPS authentication vectors, or non-current EPS security contexts, shall not be distributed between MMEs belonging to different serving domains (PLMNs)." as specified in TS 33.401, clause 6.1.5. |
|
| Test Purpose | Verify that unused EPS authentication data remains in the same serving domain. |
|
| Pre-Conditions | Test environment with old and new MME in different serving domains. New MME may be simulated. |
|
| Execution Steps | The old MME receives an Identification Request message from the new MME. |
|
| Expected Results | The response to the new MME does not include unused EPS authentication data. |
|
| Expected Format of Evidence | ||
| PDFs | 791c5d9a146b0439289081cd691d39d1 | |
4.2.2.3.1 Bidding down prevention |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Bidding down prevention |
|
| Requirement Reference | TBA |
|
| Requirement Description | "The SECURITY MODE COMMAND shall include the replayed security capabilities of the UE." as specified in TS 33.401, clause 7.2. |
|
| Test Purpose | Verify that bidding down by eliminating certain UE capabilities on the interface from UE to MME is not possible. |
|
| Pre-Conditions | Test environment with UE. UE may be simulated. |
|
| Execution Steps | Attach request message includes security capabilities of the UE. |
|
| Expected Results | MME includes the same security capabilities of the UE in the SECURITY MODE COMMAND message. |
|
| Expected Format of Evidence | ||
| PDFs | 88c780c6484314eb1e50e19b1aa441f8 | |
4.2.2.3.2 NAS integrity algorithm selection and use |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | NAS integrity algorithm selection |
|
| Requirement Reference | TBA |
|
| Requirement Description | "The MME shall protect the SECURITY MODE COMMAND message with the integrity algorithm, which has the highest priority according to the ordered lists." as specified in TS 33.401, clause 7.2.4.3.1."
|
|
| Test Purpose | Verify that NAS integrity protection algorithm is selected and applied correctly. |
|
| Pre-Conditions | Test environment with UE. UE may be simulated. |
|
| Execution Steps | The MME sends the SECURITY MODE COMMAND message. The UE replies with the SECURITY MODE COMPLETE message. |
|
| Expected Results |
|
|
| Expected Format of Evidence | ||
| PDFs | f8a427728e562ad28462e8d52cbdf9f5 | |
4.2.2.3.3 NAS NULL integrity protection |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | NAS NULL integrity protection |
|
| Requirement Reference | TBA |
|
| Requirement Description | "EIA0 shall only be used for unauthenticated emergency calls." as specified in TS 33.401, clause 5.1.4.1." |
|
| Test Purpose | Verify that NAS NULL integrity protection algorithm is used correctly. |
|
| Pre-Conditions | Test environment with UE. UE may be simulated. |
|
| Execution Steps | The MME sends the SECURITY MODE COMMAND message after successful UE authentication. |
|
| Expected Results | The selected integrity algorithm is different from EIA0. |
|
| Expected Format of Evidence | ||
| PDFs | 6d731999c5d75683da1aef298e64500c | |
4.2.2.3.4 NAS confidentiality protection |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | NAS confidentiality protection |
|
| Requirement Reference | TBA |
|
| Requirement Description | "The UE...sends the NAS security mode complete message to MME ciphered and integrity protected." as specified in TS 33.401, clause 7.2.4.3.1." |
|
| Test Purpose | Verify that NAS confidentiality protection algorithm is applied correctly. |
|
| Pre-Conditions | Test environment with UE. UE may be simulated. |
|
| Execution Steps | The MME receives the SECURITY MODE COMPLETE message without confidentiality protection. |
|
| Expected Results | If a confidentiality algorithm different from EEA0 was selected the MME rejects the message. |
|
| Expected Format of Evidence | ||
| PDFs | 1a78c9e5e7d01c1b96d8bde3ce88bcd9 | |
4.2.2.4.1 Bidding down prevention in X2-handovers |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Bidding down prevention in X2-handovers |
|
| Requirement Reference | TBA |
|
| Requirement Description | "The MME shall verify that the UE EPS security capabilities received from the eNB are the same as the UE EPS security capabilities that the MME has stored." as specified in TS 33.401, clause 7.2.4.2.2." |
|
| Test Purpose | Verify that bidding down is prevented in X2-handovers. |
|
| Pre-Conditions | Test environment with (target) eNB. eNB may be simulated. The MME is configured to log the event of a UE EPS security capability mismatch. |
|
| Execution Steps | The MME receives the path-switch message with the UE EPS security capabilities different from the ones stored in the MME for that UE. |
|
| Expected Results | The MME logs the event. |
|
| Expected Format of Evidence | ||
| PDFs | 63a9aa421017b0d78479e69f4c8d418f | |
4.2.2.4.2 NAS integrity protection algorithm selection in MME change |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | NAS integrity protection algorithm selection in MME change |
|
| Requirement Reference | TBA |
|
| Requirement Description | "In case there is change of MMEs and algorithms to be used for NAS, the target MME shall initiate a NAS security mode command procedure and include the chosen algorithms and the UE security capabilities (to detect modification of the UE security capabilities by an attacker) in the message to the UE (see clause 7.2.4.4). The MME shall select the NAS algorithms which have the highest priority according to the ordered lists (see clause 7.2.4.3.1)." as specified in TS 33.401, clause 7.2.4.3.2." |
|
| Test Purpose | Verify that NAS integrity protection algorithm is selected correctly. |
|
| Pre-Conditions | Test environment with source and target MME. Source MME may be simulated. |
|
| Execution Steps | The target MME receives the UE EPS security capabilities and the NAS algorithms used by the source MME from the source MME over the S10 interface. The target MME selects the NAS algorithms which have the highest priority according to the ordered lists. The lists are assumed such that the algorithms selected by the target MME are different from the ones received from the source MME. |
|
| Expected Results | The target MME initiates a NAS security mode command procedure and include the chosen algorithms and the UE security capabilities. |
|
| Expected Format of Evidence | ||
| PDFs | c7ea016f2d0541676a96ca67649c1fad | |
4.2.2.5.1 No access with 2G SIM via idle mode mobility |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Idle mode mobility into E-UTRAN forbidden for GSM subscribers |
|
| Requirement Reference | TBA |
|
| Requirement Description | "In case the MM context in the Context Response/SGSN Context Response indicates GSM security mode, the MME shall abort the procedure." as specified in TS 33.401, clause 9.1.2. |
|
| Test Purpose | Verify that 2G subscribers cannot obtain service in EPS via idle mode mobility. |
|
| Pre-Conditions | Test environment with source SGSN and target MME. Source SGSN may be simulated. |
|
| Execution Steps | The target MME receives the MM context in the Context Response indicating GSM security mode. |
|
| Expected Results | The MME aborts the procedure by acknowledging the Context Response from the SGSN with an appropriate failure cause. |
|
| Expected Format of Evidence | ||
| PDFs | 02372a25d84cec3ce7f9c042b526c45a | |
4.2.2.5.2 No access with 2G SIM via handover |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Handover into E-UTRAN forbidden for GSM subscribers |
|
| Requirement Reference | TBA |
|
| Requirement Description | "In case the MM context in the Forward relocation request message indicates GSM security mode (i.e. it contains a Kc), the MME shall abort the non-emergency call procedure." as specified in TS 33.401, clause 9.2.2. |
|
| Test Purpose | Verify that GSM subscribers cannot obtain service in EPS via handovers. |
|
| Pre-Conditions | Test environment with source SGSN and target MME. Source SGSN may be simulated. |
|
| Execution Steps | The target MME receives the MM context in the Forward Location Request message indicating GSM security mode. |
|
| Expected Results | The MME aborts the procedure by responding to the Forward Relocation Request from the SGSN with an appropriate failure cause. |
|
| Expected Format of Evidence | ||
| PDFs | 5a74d5685d1983509af9fa62c337a8fc | |
4.2.2.5.3 No access with 2G SIM via SRVCC |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | SRVCC into E-UTRAN forbidden for GSM subscribers |
|
| Requirement Reference | TBA |
|
| Requirement Description | "If the MME receives a GPRS Kc' from the source MSC server enhanced for SRVCC in the CS to PS HO request, the MME shall reject the request." as specified in TS 33.401, clause 14.3.1. |
|
| Test Purpose | Verify that GSM subscribers cannot obtain service in EPS via SRVCC into E-UTRAN. |
|
| Pre-Conditions | Test environment with source MSC server and target MME. Source MSC server may be simulated. |
|
| Execution Steps | The target MME receives the GPRS Kc' and the CKSN'~PS~ in the CS to PS handover request. |
|
| Expected Results | The MME rejects the request. |
|
| Expected Format of Evidence | ||
| PDFs | 37ff4f7b218a281d87d54a4175129e58 | |
4.2.2.6.1 Authentication failure for emergency bearers |
Home → MME → 18.0.0 |
| 33116-h00  33116-i00 → 33116-j00 | |
| Test Name | ||
| Threat Reference | TBA Security Objective References: TBA |
|
| Requirement Name | Emergency bearer establishment when authentication fails |
|
| Requirement Reference | TS 33.401 [5], clause 15.1. |
|
| Requirement Description | "The MME or UE shall always release any established non-emergency bearers, when the authentication fails in the UE or in the MME." as specified in TS 33.401, clause 15.1. |
|
| Test Purpose | Ensure that the MME enforces that only emergency bearers can be used without successful authentication. |
|
| Pre-Conditions | Test environment with MME and UE. UE may be simulated. The serving network policy allows unauthenticated IMS Emergency Sessions. |
|
| Execution Steps | The UE sends the initial attach request for EPS emergency bearer services, then the MME initiates an authentication, which fails. The UE attached for EPS emergency bearer services sends the PDN Connectivity request for EPS non-emergency bearer services. |
|
| Expected Results | The MME allows to continue the set up of the emergency bearer, and will reject the PDN Connectivity request for EPS non-emergency bearer services. |
|
| Expected Format of Evidence | ||
| PDFs | 62d4391d026e9b48038f5343c98be94c | |