The regulatory, physical, and software-related infrastructure required to achieve 5G’s promising capabilities invites a variety of vulnerabilities.