contact@p1sec.com

P1 Vulnerability Knowledge Base (VKB) is a unique up-to-date database of all vulnerabilities that are detected by our expert consulting findings.
P1 Telecom Auditor (PTA) is a Core Network, SS7, GTP-C, Diameter and 5G vulnerability scanner and security auditor for 2G, 3G, 4G and 5G networks.
PTF (P1 Telecom Fuzzer) is a Telecom protocols oriented fuzzer using automated fuzzing tests generation & reproducible fuzzing tests for all telecom generations, from 2G to 5G.
P1 Telecom Monitor (PTM) is an Intrusion Detection System (IDS) specifically designed for Signaling Core Networks. PTM enables tracking and reduction of signaling network misuse, providing a dashboard of frauds and attacks.

P1 Security is the World Leader in Telecom Security Software & Services

P1 Security is one of the very few companies in the World tackling telecom security through pure Mobile and Telecom Security attacks and security from 5G and Cloud Security, OpenRAN, Network Slicing and RAN Sharing, Edge Computing (MEC), OpenRAN down to legacy 4G Diameter, SS7 SIGTRAN attacks, GTP manipulation and fuzzing

P1 Security offers Threat Intelligence through the converged use of our PTM Network Intrusion Detection System & VKB Vulnerability Knowledge Base and their integration into a TSOC (Telecom Security Operations Center). Our researchers have presented studies on 5G Protocols, Core and RAN Security, Cloud Computing security for Operators, SS7 and HLR security and demonstrated how HLR/HSS can be brought down with simple attacks over SS7 networks. They have also shown attacks on the LTE Core using silent compromise of Central Core Network Elements like DRA.

P1 Labs, the R&D branch of P1 Security, is leading many research projects, investigating mobile and telecom networks infrastructures’ exposure and subscribers’ privacy leaks.

We are a Vendor independent, neutral Company with established references in Europe, North America, Asia, Middle East and Africa.

Recent News

A database for Telecom Vulnerabilities

What is the VKB? P1 Vulnerability Knowledge Base (aka the VKB) is a telecom dedicated database of the vulnerabilities detected and reported through the use of P1 Security software PTA, PTF and PTM or through P1...
Read More…

(Pen)Testing 5G Core Networks

P1 Security has developed in the two last years a set of tools and libraries to help with testing, and pentesting, 5G Core Networks. A dedicated commercial Signaling Scanner is also available since June 2021 for...
Read More…

Remote Code Execution through Signaling Using Log4j (CVE-2021-44228)

What is Log4Shell ? Log4Shell (CVE-2021-44228) is a vulnerability in Log4j, a popular Java logging framework, involving arbitrary code execution. It impacts the library version from 2.0-beta9 to 2.16.0, excluding...
Read More…

All authentication vectors are not made equal

Abstract:In mobile networks, 3G and 4G authentication vectors are completely separate and should not be convertible to each other. P1 Security however discovered that some MNOs distribute over roaming interconnects,...
Read More…