The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs.
References
Link | Resource |
---|---|
https://tetraburst.com/ | Third Party Advisory |
https://tetraburst.com/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://tetraburst.com/ - Third Party Advisory |
12 Dec 2023, 17:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Midnightblue
Midnightblue tetra\ |
|
CPE | cpe:2.3:a:midnightblue:tetra\:burst:-:*:*:*:*:*:*:* | |
References | () https://tetraburst.com/ - Third Party Advisory | |
CWE | CWE-327 |
05 Dec 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-05 14:15
Updated : 2024-11-21 06:50
NVD link : CVE-2022-24403
Mitre link : CVE-2022-24403
CVE.ORG link : CVE-2022-24403
JSON object : View
Products Affected
midnightblue
- tetra\
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm