- HTTP response banners reveal software types and version details to potential attackers.
- European telecom operators face a 47% exposure rate, nearly double the UK figure.
What happened
A cybersecurity study by Ethiack found that 19% of UK telecom web servers expose security-critical configuration data. The exposure mainly comes from HTTP response banners that reveal software types and version details.
Researchers analysed more than 50,000 digital assets across nearly 600 telecom operators in Europe. The scope included customer portals, APIs, email systems, and administrative interfaces. UK operators such as BT, Vodafone, and Three accounted for over 8,300 assets in the dataset.
The study shows that UK exposure levels remain below the European average of 47%. However, the absolute number of affected systems remains large due to the scale of telecom infrastructure.
Alongside configuration leaks, issues with security certificates are also present across European telecom networks. Around 37% of telecom website certificates are invalid, expired, or misconfigured.
Researchers noted that leaked server details do not directly create vulnerabilities. However, they can help attackers identify software versions and link them to known exploits.
Why it’s important
The findings show how small configuration signals can become actionable reconnaissance data for attackers. Even passive data exposure reduces the effort required to map telecom environments and identify weaker entry points.
This risk is amplified in telecom networks because they sit at the core of national digital infrastructure. They support financial systems, public services, and enterprise connectivity. Weaknesses in this layer can therefore have cascading operational impact.
Certificate and configuration issues also point to ongoing operational challenges in managing large, distributed infrastructure. As telecom systems become more software-driven, visibility increases but so does exposure risk.
Automated scanning tools can exploit these minor leaks at scale, accelerating targeting and exploitation chains.
For operators, the results underline the need for stricter configuration control and continuous monitoring. Reducing unnecessary information disclosure becomes as important as patching known vulnerabilities.
Also read: Basic-Fit says data breach exposes details of a million members
Also read: North Korea-linked hack hits core internet software supply chain






