The authors reveal vulnerabilities in lower layers of 4G/5G networks, highlighting the risks of unprotected control procedures and potential attacks.