Home
/
Blog
/

Operations Administration and Maintenance in Mobile Networks: The Management Plane Attack Surface That Matters

Deep dive on OAM for mobile networks. What it is, how 5G and O RAN implement it, common attack paths, and a practical hardening checklist for operators.

Research
Oct 28, 2025
Operations Administration and Maintenance in Mobile Networks: The Management Plane Attack Surface That Matters

Mobile networks run because someone keeps the lights on. That someone is OAM, the set of functions and systems for Operations, Administration, and Maintenance. It is where you configure elements, roll out software, observe performance, and recover when things go wrong. It is also one of the most attractive targets for attackers because it connects business intent with the technical levers that move the network.

This post maps the OAM landscape across 4G and 5G including O RAN, shows where real security risks live, and offers a concrete checklist you can apply today.

What OAM means in practice

OAM spans people, processes, and tooling that manage network elements and services. In a typical operator environment you will find:

  • Element Management Systems that control specific vendors and domains
  • Network Management Systems and OSS stacks that aggregate inventory and performance
  • Service orchestration and automation that push changes at scale
  • Fault management and telemetry collectors that feed NOC and SOC workflows
  • Backup and restore, golden configs, and software distribution
  • Remote access paths for staff and vendors

The technology mix is wide. Classic SNMP and CLI. Modern NETCONF and YANG. Web and REST APIs. Message buses. Databases. CI and CD runners for cloud native cores. Kubernetes for CNFs with admission controllers and operators. Every one of these is part of the management plane.

OAM in 5G and O RAN

5G brings cloud native design and new management interfaces. A few anchors:

  • Service Based Core uses APIs for control, which shifts a lot of day to day operations into platform and pipeline management
  • O RAN adds the SMO for service management and orchestration, the RIC for near real time control, and the O1 and A1 interfaces for management and policy
  • Automation first means Git repositories, build runners, artifact registries, Helm charts, and operators become part of OAM inventory
  • Multi tenancy and network slicing push more policy and RBAC into the management plane

If you protect only the radio and core planes but leave OAM open, you have not protected the network.

Where attackers actually get in

Real incidents share familiar patterns. The management plane is often reachable in more ways than architects expect.

  1. Exposed management interfaces
    Web UIs, SSH, legacy Telnet that never got turned off, SOAP endpoints, and ad hoc admin ports bound on the wrong interface.
  2. Weak identity and access
    Shared accounts, default credentials, incomplete MFA coverage, and inconsistent RBAC across EMS, SMO, RIC, and Kubernetes.
  3. Pipeline compromise
    CI and CD tokens with broad scope, build agents with long lived secrets, artifact registries that accept unsigned images, and inadequate review on IaC repositories.
  4. Certificate and key lifecycle issues
    Self signed or expired certs, unpinned services, and private keys left on jump hosts or build agents.
  5. Vendor and integrator remote access
    Permanent tunnels and appliances that bypass change control and central logging.
  6. Telemetry and logging blind spots
    OAM systems generate rich logs but often live outside the SOC enrichment path. That leaves threat hunting blind to the most dangerous changes.
  7. Backups and snapshots
    Unencrypted backups with sensitive configs and subscriber adjacent data stored on flat networks.
  8. O RAN specific edges
    O1 termination that rides on shared transport, SMO plugins with broad privileges, and policy paths into the RIC that modify behavior at scale.

Threat led scenarios to test

  • Push a config change to a small cell group through an exposed EMS API then pivot to the core via stored credentials
  • Compromise a CI runner and inject a modified Helm chart that disables checks on a CNF
  • Abuse an A1 policy path to influence RIC behavior and degrade service for a slice
  • Restore from an old backup to roll back a security fix on a border function
  • Use weak RBAC in Kubernetes to read secrets and move laterally into network functions

If a scenario feels far fetched, try it in a lab. You will learn fast.

A practical OAM security checklist

Treat this as a starting point. It assumes mixed vendor environments, 5G core on Kubernetes, and O RAN adoption.

Identity first

  • Enforce MFA for all OAM logins including vendors
  • Eliminate shared accounts and map roles to RBAC in EMS, SMO, RIC, and Kubernetes
  • Use short lived credentials with just in time elevation through PAM

Network and segmentation

  • Place OAM on dedicated segments with default deny between domains
  • Terminate admin access on bastions with session recording and command allow lists
  • For O RAN, isolate O1 termination and SMO northbound from user and control planes

Interface hygiene

  • Inventory every management interface and bind only to management subnets
  • Disable legacy protocols and unused services
  • Enforce TLS with modern ciphers and verify certificates end to end

Build and release security

  • Sign all artifacts including container images and Helm charts
  • Require code review for IaC and configuration repositories
  • Use dedicated CI workers for production pipelines with ephemeral tokens
  • Scan images and dependencies before promotion and block on critical findings

Secrets and certificates

  • Store secrets in a manager with envelope encryption and strong audit trails
  • Rotate keys and certificates on a fixed schedule and on demand after incidents
  • Pin service identities where supported and verify at the client

Observability and tamper evidence

  • Centralize OAM logs into the SOC path with clear field mappings
  • Emit high value events for auth, role changes, policy pushes, and config diffs
  • Record and retain session transcripts from bastions and vendor access points

Backups and recovery

  • Encrypt backups in transit and at rest, store in segmented locations, and test restore paths
  • Keep golden configs under version control with signed commits and reproducible builds

Vendor and third party access

  • Replace permanent tunnels with scheduled access and approval gates
  • Require vendor patch notes and SBOMs, and verify signatures before installation

O RAN specifics

  • Validate SMO plugins and RIC xApps and rApps before onboarding
  • Enforce least privilege on O1 and A1 producers and consumers
  • Monitor policy changes as security relevant events, not just operational ones

What to log from OAM systems

If you log everything, you drown. If you log too little, you miss the incident. Focus on:

  • Auth successes and failures with source, target system, and factor used
  • Role and permission changes with requester and approver
  • Configuration set and delete events with object identity and diff
  • Pipeline runs with git commit, artifact digests, and target environment
  • Certificate issuance and revocation
  • SMO policy updates and RIC app lifecycle events
  • Kubernetes admin verbs on sensitive resources including secrets, roles, and webhooks

Verification beats policy

Paper rules are easy. Verification is the hard part. Prove controls work with:

  • Continuous discovery of management interfaces and services
  • Automated checks for weak ciphers, expired certs, and default credentials
  • Rehearsed restore drills for OAM components and CNFs
  • Red team style exercises that target OAM first, not last

Minimal glossary for quick alignment

  • OAM: Operations, Administration, and Maintenance
  • EMS: Element Management System
  • SMO: Service Management and Orchestration in O RAN
  • RIC: RAN Intelligent Controller
  • O1 and A1: O RAN management and policy interfaces
  • CNF: Cloud Native Network Function

Closing

OAM is not a sidecar. It is the control room of the network. Secure it with the same discipline you apply to signaling edges and data planes. Inventory first, identity first, pipeline integrity, and visibility that lands in the SOC. Do these well and many headline issues become routine non events.

If you want a deeper dive on any section, say which platform or interface you are using and we can turn this into a targeted playbook for that stack.

Summary
Download our whitepaper

LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Be informed

SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Towards Harmonization: Mapping EU Telecom Security Regulations and their evolution

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.