Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.
References
Link | Resource |
---|---|
https://tetraburst.com/ | Vendor Advisory |
https://tetraburst.com/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://tetraburst.com/ - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
25 Oct 2023, 19:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Midnightblue tetra\
Midnightblue |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
CPE | cpe:2.3:a:midnightblue:tetra\:burst:-:*:*:*:*:*:*:* | |
CWE | CWE-639 | |
References | (MISC) https://tetraburst.com/ - Vendor Advisory |
19 Oct 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-19 10:15
Updated : 2024-11-21 06:50
NVD link : CVE-2022-24401
Mitre link : CVE-2022-24401
CVE.ORG link : CVE-2022-24401
JSON object : View
Products Affected
midnightblue
- tetra\