This attack vector is dubbed ReVoLTE by experts at the Ruhr University in Bochum, and it exists because of the practices of cellular operators who often use a single encryption key to protect multiple 4G calls within a single tower.
However, employees of the Ruhr University in Bochum have found that not all operators are conscientious about following the recommendations of the 4G standard. In particular, several calls can be protected at once with one encryption key.
Typically, this problem manifests itself at the cell tower level, which in most cases reuses the encryption key.
If we transfer the exploitation of this vulnerability to a real attack, then the attacker will be able to record the conversation between two subscribers using 4G for communication. Then, in order to fix the encryption key, the attacker will make the call himself. And later, the criminal will be able to decrypt the communication using the same encryption key.
A demonstration of the exploitation of the ReVoLTE attack vector is available in the video below:
ORIGINAL PAGE –