Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.
References
Link Providers
https://tetraburst.com/ cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published: 2023-10-19T09:32:53.702Z

Updated: 2024-08-03T04:13:55.205Z

Reserved: 2022-02-04T04:43:09.526Z

Link: CVE-2022-24401

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-19T10:15:09.510

Modified: 2024-11-21T06:50:20.597

Link: CVE-2022-24401

cve-icon Redhat

No data.