4G/5G low-layer control procedures are vulnerable to passive and active attacks, leading to user tracking, communication disruption, and privacy breaches.
Lower layers of 4G/5G networks are vulnerable to passive and active attacks due to lack of encryption and integrity protection.