Home MME

4.2.2.2.1 Access with GSM SIM forbidden

Home MME19.0.0
 33116-j00
Test Name
Threat Reference

TR 33.926 [9], clause A.2.2.1 Access to GSM.

Requirement Name

GSM SIM access forbidden

Requirement Reference

TS 33.401[5], clause 6.1.1

Requirement Description

"Access to E-UTRAN with a GSM SIM or a SIM application on a UICC shall not be granted." as specified in TS 33.401 [5], clause 6.1.1.

Test Purpose

Verify that access to EPS with a GSM SIM is not possible.

Pre-Conditions

Test environment with HSS. HSS may be simulated.

Execution Steps

Include GSM authentication vector in authentication data response from HSS.

Expected Results

MME rejects UE authentication when receiving GSM authentication vector from HSS.

NOTE: When both MME and HSS function correctly GSM authentication vector are never included in authentication data response from HSS to MME.

Expected Format of Evidence
PDFs da04d68910be51c28a3b3e53dc5c7eb2

4.2.2.2.2 Re-synchronization

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], clause A.2.2.2 Resynchronization.

Requirement Name

Inclusion of RAND, AUTS

Requirement Reference

TS 33.401[5], clause 6.1.2

Requirement Description

"In the case of a synchronization failure, the MME shall also include RAND and AUTS." as specified in TS 33.401 [5], clause 6.1.2.

Test Purpose

Verify that Re-synchronization procedure works correctly.

Pre-Conditions

Test environment with UE and HSS. UE and HSS may be simulated.

Execution Steps

The MME receives an AUTHENTICATION FAILURE message, with the EMM cause #21 "synch failure" and a re‑synchronization token AUTS.

Expected Results

The MME includes the stored RAND and the received AUTS in the authentication data request to the HSS.

NOTE: When RAND and AUTS are not included in the authentication data request to the HSS then the HSS will return a new authentication vector (AV) based on its current value of the sequence number SQN~HE~ (cf. TS 33.102, clause 6.3.5) A new authentication procedure between MME and UE using this new AV will be successful just the same if the cause of the synchronisation failure was the sending of a "stale" challenge, i.e. one that the UE had seen before or deemed to be too old. But if the cause of the synchronisation failure was a problem with the sequence number SQN~HE~ in the HSS (which should be very rare), and the RAND and AUTS are not included in the authentication data request to the HSS, then an update of SQN~HE~ based on AUTS will not occur in the HSS, and the new authentication procedure between MME and UE using the new AV will fail again. This can be considered a security-relevant failure case as it may lead to a subscriber being shut out from the system permanently.

Expected Format of Evidence
PDFs b8042c099e375e703391d20071f11418

4.2.2.2.3 Integrity check of Attach message

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], clause A.2.2.3 Failed Integrity check of Attach message.

Requirement Name

Integrity check of Attach message

Requirement Reference

TS 33.401[5], clause 6.1.4

Requirement Description

"If the user cannot be identified or the integrity check fails, then the MME shall send a response indicating that the user identity cannot be retrieved." as specified in TS 33.401, clause 6.1.4.

Test Purpose

Verify that secure user identification by means of integrity check of Attach request works correctly.

Pre-Conditions

Test environment with new and old MME. New MME may be simulated.

Execution Steps

The old MME receives an Identification Request message from the new MME with incorrect integrity protection.

Expected Results

The old MME sends a response indicating that the user identity cannot be retrieved.

Expected Format of Evidence
PDFs 0a665d01441d8bdf9b1f475c64616a55

4.2.2.2.4 Not forwarding EPS authentication data to SGSN

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], clause A.2.2.4 Forwarding EPS authentication data to SGSN.

Requirement Name

Not forwarding EPS authentication data to SGSN

Requirement Reference

TS 33.401[5], clause 6.1.4

Requirement Description

"EPS authentication data shall not be forwarded from an MME towards an SGSN." as specified in TS 33.401[5], clause 6.1.4.

Test Purpose

Verify that EPS authentication data remains in the EPC.

Pre-Conditions

Test environment with MME and SGSN. SGSN may be simulated.

Execution Steps

The MME receives an Identification Request message from the SGSN.

Expected Results

The response to the SGSN does not include EPS authentication data.

Expected Format of Evidence
PDFs 3e0841bab5e1c49c8ec4a7be7991f15b

4.2.2.2.5 Not forwarding unused EPS authentication data between different security domains

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], clause A.2.2.5 Forwarding unused EPS authentication data between different security domains.

Requirement Name

Not forwarding unused EPS authentication between different security domains

Requirement Reference

TS 33.401[5], clause 6.1.5

Requirement Description

"Unused EPS authentication vectors, or non-current EPS security contexts, shall not be distributed between MMEs belonging to different serving domains (PLMNs)." as specified in TS 33.401, clause 6.1.5.

Test Purpose

Verify that unused EPS authentication data remains in the same serving domain.

Pre-Conditions

Test environment with old and new MME in different serving domains. New MME may be simulated.

Execution Steps

The old MME receives an Identification Request message from the new MME.

Expected Results

The response to the new MME does not include unused EPS authentication data.

Expected Format of Evidence
PDFs 6ccb817d5cfd620d57e2367c1a0001ab

4.2.2.3.1 Bidding down prevention

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.3.1 Bidding Down.

Security Objective References: TBA

Requirement Name

Bidding down prevention

Requirement Reference

TS 33.401[5], clause 7.2

Requirement Description

"The SECURITY MODE COMMAND shall include the replayed security capabilities of the UE." as specified in TS 33.401[5], clause 7.2.

Test Purpose

Verify that bidding down by eliminating certain UE capabilities on the interface from UE to MME is not possible.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

Attach request message includes security capabilities of the UE.

Expected Results

MME includes the same security capabilities of the UE in the SECURITY MODE COMMAND message.

Expected Format of Evidence
PDFs b6fc802db6ea4c7aa0fc9b9110966e1a

4.2.2.3.2 NAS integrity algorithm selection and use

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.3.2 NAS integrity selection and use

Requirement Name

NAS integrity algorithm selection

Requirement Reference

TS 33.401[5], clause 7.2.4.3.1

Requirement Description

"The MME shall protect the SECURITY MODE COMMAND message with the integrity algorithm, which has the highest priority according to the ordered lists." as specified in TS 33.401 [5], clause 7.2.4.3.1."

NOTE: The text in TS 33.401 [5], clause 7.2.4.3.1 is somewhat incomplete. It should properly read: "...which has the highest priority according to the ordered lists and is contained in the UE EPS security capabilities."

Test Purpose

Verify that NAS integrity protection algorithm is selected and applied correctly.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

The MME sends the SECURITY MODE COMMAND message. The UE replies with the SECURITY MODE COMPLETE message.

Expected Results
  1. The MME has selected the integrity algorithm which has the highest priority according to the ordered lists and is contained in the UE EPS security capabilities. The MME checks the message authentication code on the SECURITY MODE COMPLETE message.

  2. The MAC in the SECURITY MODE COMPLETE is verified, and the NAS integrity protection algorithm is selected and applied correctly.

Expected Format of Evidence
PDFs 9e6e423cda724ab81697e84ed29801e0

4.2.2.3.3 NAS NULL integrity protection

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.3.3 NAS NULL integrity protection

Requirement Name

NAS NULL integrity protection

Requirement Reference

TS 33.401[5], clause 5.1.4.1

Requirement Description

"EIA0 shall only be used for unauthenticated emergency calls." as specified in TS 33.401[5], clause 5.1.4.1."

Test Purpose

Verify that NAS NULL integrity protection algorithm is used correctly.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

The MME sends the SECURITY MODE COMMAND message after successful UE authentication.

Expected Results

The selected integrity algorithm is different from EIA0.

Expected Format of Evidence
PDFs d3b2f92e8215b27656cb3d58f53e81ee

4.2.2.3.4 NAS confidentiality protection

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.3.4 NAS confidentiality protection

Requirement Name

NAS confidentiality protection

Requirement Reference

TS 33.401[5], clause 7.2.4.3.1

Requirement Description

"The UE...sends the NAS security mode complete message to MME ciphered and integrity protected." as specified in TS 33.401[5], clause 7.2.4.3.1.

Test Purpose

Verify that NAS confidentiality protection algorithm is applied correctly.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

The MME receives the SECURITY MODE COMPLETE message without confidentiality protection.

Expected Results

If a confidentiality algorithm different from EEA0 was selected the MME rejects the message.

Expected Format of Evidence
PDFs d753ddbbd670c1de85eb971bda5b7bc3

4.2.2.4.1 Bidding down prevention in X2-handovers

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.4.1 Bidding down on X2-Handover

Requirement Name

Bidding down prevention in X2-handovers

Requirement Reference

TS 33.401[5], clause 7.2.4.2.2

Requirement Description

"The MME shall verify that the UE EPS security capabilities received from the eNB are the same as the UE EPS security capabilities that the MME has stored." as specified in TS 33.401[5], clause 7.2.4.2.2."

Test Purpose

Verify that bidding down is prevented in X2-handovers.

Pre-Conditions

Test environment with (target) eNB. eNB may be simulated.

The MME is configured to log the event of a UE EPS security capability mismatch.

Execution Steps

The MME receives the path-switch message with the UE EPS security capabilities different from the ones stored in the MME for that UE.

Expected Results

The MME logs the event.

Expected Format of Evidence
PDFs b78625bcd4c000dee59b5793da72746d

4.2.2.4.2 NAS integrity protection algorithm selection in MME change

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.4.2 NAS integrity protection algorithm selection in MME change

Requirement Name

NAS integrity protection algorithm selection in MME change

Requirement Reference

TS 33.401[5], clause 7.2.4.3.2

Requirement Description

"In case there is change of MMEs and algorithms to be used for NAS, the target MME shall initiate a NAS security mode command procedure and include the chosen algorithms and the UE security capabilities (to detect modification of the UE security capabilities by an attacker) in the message to the UE (see clause 7.2.4.4). The MME shall select the NAS algorithms which have the highest priority according to the ordered lists (see clause 7.2.4.3.1)." as specified in TS 33.401[5], clause 7.2.4.3.2."

Test Purpose

Verify that NAS integrity protection algorithm is selected correctly.

Pre-Conditions

Test environment with source and target MME. Source MME may be simulated.

Execution Steps

The target MME receives the UE EPS security capabilities and the NAS algorithms used by the source MME from the source MME over the S10 interface. The target MME selects the NAS algorithms which have the highest priority according to the ordered lists. The lists are assumed such that the algorithms selected by the target MME are different from the ones received from the source MME.

Expected Results

The target MME initiates a NAS security mode command procedure and include the chosen algorithms and the UE security capabilities.

Expected Format of Evidence
PDFs 1b9e1a31a0cb3c42678276d3b4a4995b

4.2.2.5.1 No access with GSM SIM via idle mode mobility

Home MME19.0.0
 33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.5.1 GSM SIM access via idle mode mobility

Requirement Name

Idle mode mobility into E-UTRAN forbidden for GSM subscribers

Requirement Reference

TS 33.401[5], clause 9.1.2

Requirement Description

"In case the MM context in the Context Response/SGSN Context Response indicates GSM security mode, the MME shall abort the procedure." as specified in TS 33.401, clause 9.1.2.

Test Purpose

Verify that GSM subscribers cannot obtain service in EPS via idle mode mobility.

Pre-Conditions

Test environment with source SGSN and target MME. Source SGSN may be simulated.

Execution Steps

The target MME receives the MM context in the Context Response indicating GSM security mode.

Expected Results

The MME aborts the procedure by acknowledging the Context Response from the SGSN with an appropriate failure cause.

Expected Format of Evidence
PDFs 58a64c11d8462e39e625494a8e73570a

4.2.2.5.2 No access with GSM SIM via handover

Home MME19.0.0
 33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.5.3 GSM SIM access via SRVCC

Requirement Name

Handover into E-UTRAN forbidden for GSM subscribers

Requirement Reference

TS 33.401[5], clause 9.2.2

Requirement Description

"In case the MM context in the Forward relocation request message indicates GSM security mode (i.e. it contains a Kc), the MME shall abort the non-emergency call procedure." as specified in TS 33.401, clause 9.2.2.

Test Purpose

Verify that GSM subscribers cannot obtain service in EPS via handovers.

Pre-Conditions

Test environment with source SGSN and target MME. Source SGSN may be simulated.

Execution Steps

The target MME receives the MM context in the Forward Location Request message indicating GSM security mode.

Expected Results

The MME aborts the procedure by responding to the Forward Relocation Request from the SGSN with an appropriate failure cause.

Expected Format of Evidence
PDFs 5002e344ac21fa3c937d0b6ff33f27f8

4.2.2.5.3 No access with GSM SIM via SRVCC

Home MME19.0.0
 33116-j00
Test Name
Threat Reference

TR 33.926 [9], A.2.6 Threats related to release of non-emergency bearer

Requirement Name

SRVCC into E-UTRAN forbidden for GSM subscribers

Requirement Reference

TS 33.401[5], clause 14.3.1

Requirement Description

"If the MME receives a GPRS Kc' from the source MSC server enhanced for SRVCC in the CS to PS HO request, the MME shall reject the request." as specified in TS 33.401, clause 14.3.1.

Test Purpose

Verify that GSM subscribers cannot obtain service in EPS via SRVCC into E-UTRAN.

Pre-Conditions

Test environment with source MSC server and target MME. Source MSC server may be simulated.

Execution Steps

The target MME receives the GPRS Kc' and the CKSN'~PS~ in the CS to PS handover request.

Expected Results

The MME rejects the request.

Expected Format of Evidence
PDFs 375f2187b1334e04124d9f9b33892b16

4.2.2.6.1 Authentication failure for emergency bearers

Home MME19.0.0
33116-h00   33116-i00    33116-j00
Test Name
Threat Reference

TBA

Requirement Name

Emergency bearer establishment when authentication fails

Requirement Reference

TS 33.401 [5], clause 15.1.

Requirement Description

"The MME or UE shall always release any established non-emergency bearers, when the authentication fails in the UE or in the MME." as specified in TS 33.401, clause 15.1.

Test Purpose

Ensure that the MME enforces that only emergency bearers can be used without successful authentication.

Pre-Conditions

Test environment with MME and UE. UE may be simulated. The serving network policy allows unauthenticated IMS Emergency Sessions.

Execution Steps

The UE sends the initial attach request for EPS emergency bearer services, then the MME initiates an authentication, which fails. The UE attached for EPS emergency bearer services sends the PDN Connectivity request for EPS non-emergency bearer services.

Expected Results

The MME allows to continue the set up of the emergency bearer, and will reject the PDN Connectivity request for EPS non-emergency bearer services.

Expected Format of Evidence
PDFs 67cda064490c7cb1a41aa77b66785a63