cellular security Magma Vulnerabilities