Skip to Content

5G Network Slicing Security Risks Report

Updated on 2022-12-15: 5G network slicing guidance

CISA and the NSA have released new guidance this week for 5G network operators as part of a larger series they started earlier this week. This new one [PDF] touches on how mobile networks can best set up and defend 5G networks that have been split into smaller parts—an architecture known as 5G network slicing.

Updated on 2022-12-14

The NSA, the CISA, and the ODNI issued a joint report highlighting the potential threats and risks associated with 5G network slicing implementations and offering mitigation strategies. Read more: NSA shares tips on mitigating 5G network slicing threats

Network slicing examples (CISA)

Overview: 5G Network Slicing Security Risks Report

The US National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Office of the Director of National Intelligence (ODNI) have published a joint report on potential threats to 5G network slicing. According to the report, “a network slice is an end-to-end logical network that provides specific network capabilities and characteristics to fit a user’s needs. Although multiple network slices run on a single physical network, network slice users are authenticated for only one network area, enabling data and security isolation.”


  • In essence, VLANs/SDN for 5G. (And so much more.) The biggest identified risks are DOS, MITM and configuration attacks. So, controls need to be there, only allow the devices/services intended, and not leak data. If you’ve ever configured devices or offices connected by cellular service, this virtualization raises the bar on isolating your traffic, with increased bandwidth, with flexibility and affordability we never saw with leased lines. If you’re going down this path, ask your provider how they are responding to the identified risks and how they verify they are mitigated.
  • Every shared media network technology (including satellite and fiber) has had this same sort of vulnerability, where isolation was in the specifications but the early implementations, not so much. State actors used to find and exploit these vulnerabilities for long periods of time, so it is good to see NSA putting a warning out vs. hoarding the information. But, this is not just a 5G issue, which seems to have been politicized. Make sure any plans to reduce communications costs include validated security in the evaluation process.
  • This is mischaracterized as a threat; threats have both sources and rates, not potential. Rather it is a risk. Slices are analogous to connections in POTS and VPNs in the Internet. Those who set up and rely upon these routes should exercise due caution.


Alex Lim is a certified IT Technical Support Architect with over 15 years of experience in designing, implementing, and troubleshooting complex IT systems and networks. He has worked for leading IT companies, such as Microsoft, IBM, and Cisco, providing technical support and solutions to clients across various industries and sectors. Alex has a bachelor’s degree in computer science from the National University of Singapore and a master’s degree in information security from the Massachusetts Institute of Technology. He is also the author of several best-selling books on IT technical support, such as The IT Technical Support Handbook and Troubleshooting IT Systems and Networks. Alex lives in Bandar, Johore, Malaysia with his wife and two chilrdren. You can reach him at [email protected] or follow him on Website | Twitter | Facebook

    Ads Blocker Image Powered by Code Help Pro

    Your Support Matters...

    We run an independent site that is committed to delivering valuable content, but it comes with its challenges. Many of our readers use ad blockers, causing our advertising revenue to decline. Unlike some websites, we have not implemented paywalls to restrict access. Your support can make a significant difference. If you find this website useful and choose to support us, it would greatly secure our future. We appreciate your help. If you are currently using an ad blocker, please consider disabling it for our site. Thank you for your understanding and support.