Himashveta Kumar (The Pennsylvania State University), Tianchang Yang (The Pennsylvania State University), Arupjyoti Bhuyan (Idaho National Laboratory), Syed Rafiul Hussain (The Pennsylvania State University)

The emergence of the 5G Open Radio Access Network (O-RAN) architecture introduces increased flexibility and modularity to cellular networks, but its sudden shift toward software-centric and multi-vendor deployments also expands the software supply chain (SSC) attack surface, which is particularly concerning given the critical role of 5G infrastructure. SSC vulnerabilities can lead to severe consequences, including service disruption, unauthorized backdoors, and code injection. In this work, we systematically identify and analyze SSC vulnerabilities in O-RAN RAN Intelligent Controller, which performs latency-sensitive edge control and optimization in 5G networks. Using static analysis tools, we evaluate production-grade O-RAN components primarily implemented in Go and find 57 security-relevant issues after manual validation. We highlight key limitations of off-the-shelf analyzers, quantify false-positive results, and contextualize identified risks within O-RAN deployments. Our findings emphasize the need for improved SSC security practices tailored to O-RAN systems.

View More Papers

Know Me by My Pulse: Toward Practical Continuous Authentication...

Wei Shao (University of California, Davis), Zequan Liang (University of California Davis), Ruoyu Zhang (University of California, Davis), Ruijie Fang (University of California, Davis), Ning Miao (University of California, Davis), Ehsan Kourkchi (University of California - Davis), Setareh Rafatirad (University of California, Davis), Houman Homayoun (University of California Davis), Chongzhou Fang (Rochester Institute of Technology)

Read More

Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization

Meng Wang (CISPA Helmholtz Center for Information Security), Philipp Görz (CISPA Helmholtz Center for Information Security), Joschua Schilling (CISPA Helmholtz Center for Information Security), Keno Hassler (CISPA Helmholtz Center for Information Security), Liwei Guo (University of Electronic Science and Technology), Thorsten Holz (Max Planck Institute for Security and Privacy), Ali Abbasi (CISPA Helmholtz Center for…

Read More

Hey there! You are using WhatsApp: Enumerating Three Billion...

Gabriel Karl Gegenhuber (University of Vienna), Philipp Frenzel (SBA Research), Maximilian Günther (University of Vienna), Johanna Ullrich (University of Vienna), Aljosha Judmayer (University of Vienna)

Read More