In addition to this, the problem is rarely consistent. An operator may have different vulnerabilities on two parts network equipment, while a network of network tools may have created headaches on two separate carriers.
The research team officially plans to present its findings at a conference in May, and they share their tools with carriers and unit manufacturers (but not the public for obvious reasons) to help them locate vulnerabilities and develop solutions. These errors will not necessarily be exploitable as a result. Yet, they serve as a reminder that even the wireless standards you take for granted are not airtight.