Description
Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.
Published: 2023-10-19
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-29293 Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.
References
Link Providers
https://tetraburst.com/ cve-icon cve-icon
History

No history.

Subscriptions

Midnightblue Tetra\
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published:

Updated: 2024-08-03T04:13:55.205Z

Reserved: 2022-02-04T04:43:09.526Z

Link: CVE-2022-24401

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-19T10:15:09.510

Modified: 2024-11-21T06:50:20.597

Link: CVE-2022-24401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses