Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://tetraburst.com/ |
History
No history.
MITRE
Status: PUBLISHED
Assigner: NCSC-NL
Published: 2023-10-19T09:32:53.702Z
Updated: 2024-08-03T04:13:55.205Z
Reserved: 2022-02-04T04:43:09.526Z
Link: CVE-2022-24401
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-10-19T10:15:09.510
Modified: 2024-11-21T06:50:20.597
Link: CVE-2022-24401
Redhat
No data.