Jethro Beekman and Christopher Thompson

EECS Department, University of California, Berkeley

Technical Report No. UCB/EECS-2013-18

March 19, 2013

http://www2.eecs.berkeley.edu/Pubs/TechRpts/2013/EECS-2013-18.pdf

T-Mobile has a service called “Wi-Fi Calling”, which lets users make and receive calls even when without cellular service. This service is pre-installed on millions of T-Mobile Android smartphones. We analyze the security aspects of this service from a network perspective, and demonstrate a man-in-the-middle attack caused by a lack of TLS certificate validation, allowing an attacker to eavesdrop and even modify calls and text messages placed using the Wi-Fi Calling feature. We have worked with T-Mobile to fix this issue, and, as of 18 March 2013, they report that all affected customers have received an update fixing this vulnerability.


BibTeX citation:

@techreport{Beekman:EECS-2013-18,
    Author= {Beekman, Jethro and Thompson, Christopher},
    Title= {Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling},
    Year= {2013},
    Month= {Mar},
    Url= {http://www2.eecs.berkeley.edu/Pubs/TechRpts/2013/EECS-2013-18.html},
    Number= {UCB/EECS-2013-18},
    Abstract= {T-Mobile has a service called “Wi-Fi Calling”, which lets users make and receive calls even when without cellular service. This service is pre-installed on millions of T-Mobile Android smartphones. We analyze the security aspects of this service from a network perspective, and demonstrate a man-in-the-middle attack caused by a lack of TLS certificate validation, allowing an attacker to eavesdrop and even modify calls and text messages placed using the Wi-Fi Calling feature. We have worked with T-Mobile to fix this issue, and, as of 18 March 2013, they report that all affected customers have received an update fixing this vulnerability.},
}

EndNote citation:

%0 Report
%A Beekman, Jethro 
%A Thompson, Christopher 
%T Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling
%I EECS Department, University of California, Berkeley
%D 2013
%8 March 19
%@ UCB/EECS-2013-18
%U http://www2.eecs.berkeley.edu/Pubs/TechRpts/2013/EECS-2013-18.html
%F Beekman:EECS-2013-18