Vulnerabilites related to midnightblue - tetra\
Vulnerability from fkie_nvd
Published
2023-10-19 10:15
Modified
2024-11-21 06:50
Severity ?
7.5 (High) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.9 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
5.9 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Summary
A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero.
References
▶ | URL | Tags | |
---|---|---|---|
cert@ncsc.nl | https://tetraburst.com/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tetraburst.com/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
midnightblue | tetra\ | burst |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*", "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero." }, { "lang": "es", "value": "Una falla en el procedimiento de autenticaci\u00f3n TETRA permite que un adversario MITM que puede predecir el desaf\u00edo MS RAND2 establezca la clave de sesi\u00f3n DCK en cero." } ], "id": "CVE-2022-24400", "lastModified": "2024-11-21T06:50:20.453", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "cert@ncsc.nl", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T10:15:08.930", "references": [ { "source": "cert@ncsc.nl", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" } ], "sourceIdentifier": "cert@ncsc.nl", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-807" } ], "source": "cert@ncsc.nl", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-05 14:15
Modified
2024-11-21 06:50
Severity ?
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs.
References
▶ | URL | Tags | |
---|---|---|---|
cert@ncsc.nl | https://tetraburst.com/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tetraburst.com/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
midnightblue | tetra\ | burst |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*", "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs." }, { "lang": "es", "value": "La funci\u00f3n de cifrado de identidad TETRA TA61 utiliza internamente un valor de 64 bits derivado exclusivamente de SCK (redes Clase 2) o CCK (redes Clase 3). La estructura de TA61 permite una recuperaci\u00f3n eficiente de este valor de 64 bits, lo que permite a un adversario cifrar o descifrar identidades arbitrarias con solo tres pares de identidades cifradas/no cifradas conocidas." } ], "id": "CVE-2022-24403", "lastModified": "2024-11-21T06:50:20.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cert@ncsc.nl", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-05T14:15:07.510", "references": [ { "source": "cert@ncsc.nl", "tags": [ "Third Party Advisory" ], "url": "https://tetraburst.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tetraburst.com/" } ], "sourceIdentifier": "cert@ncsc.nl", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "cert@ncsc.nl", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 10:15
Modified
2024-11-21 06:50
Severity ?
5.9 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion.
References
▶ | URL | Tags | |
---|---|---|---|
cert@ncsc.nl | https://tetraburst.com/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tetraburst.com/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
midnightblue | tetra\ | burst |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*", "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion." }, { "lang": "es", "value": "Falta de verificaci\u00f3n de integridad criptogr\u00e1fica en el tr\u00e1fico cifrado de interfaz a\u00e9rea TETRA. Dado que se emplea un cifrado de flujo, esto permite que un adversario activo manipule datos de texto plano bit a bit." } ], "id": "CVE-2022-24404", "lastModified": "2024-11-21T06:50:20.940", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "cert@ncsc.nl", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T10:15:09.627", "references": [ { "source": "cert@ncsc.nl", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" } ], "sourceIdentifier": "cert@ncsc.nl", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-353" } ], "source": "cert@ncsc.nl", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-354" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 10:15
Modified
2024-11-21 06:50
Severity ?
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
The TETRA TEA1 keystream generator implements a key register initialization function that compresses the 80-bit key to only 32 bits for usage during the keystream generation phase, which is insufficient to safeguard against exhaustive search attacks.
References
▶ | URL | Tags | |
---|---|---|---|
cert@ncsc.nl | https://tetraburst.com/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tetraburst.com/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
midnightblue | tetra\ | burst |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*", "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TETRA TEA1 keystream generator implements a key register initialization function that compresses the 80-bit key to only 32 bits for usage during the keystream generation phase, which is insufficient to safeguard against exhaustive search attacks." }, { "lang": "es", "value": "El generador de flujo de claves TETRA TEA1 implementa una funci\u00f3n de inicializaci\u00f3n de registro de claves que comprime la clave de 80 bits a solo 32 bits para su uso durante la fase de generaci\u00f3n del flujo de claves, lo cual es insuficiente para protegerse contra ataques de b\u00fasqueda exhaustiva." } ], "id": "CVE-2022-24402", "lastModified": "2024-11-21T06:50:20.720", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "cert@ncsc.nl", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T10:15:09.573", "references": [ { "source": "cert@ncsc.nl", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" } ], "sourceIdentifier": "cert@ncsc.nl", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-334" } ], "source": "cert@ncsc.nl", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-19 10:15
Modified
2024-11-21 06:50
Severity ?
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.
References
▶ | URL | Tags | |
---|---|---|---|
cert@ncsc.nl | https://tetraburst.com/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tetraburst.com/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
midnightblue | tetra\ | burst |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*", "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered." }, { "lang": "es", "value": "Reutilizaci\u00f3n del flujo de claves inducida por el adversario en el tr\u00e1fico cifrado de interfaz a\u00e9rea TETRA utilizando cualquier generador de flujo de claves TEA. La generaci\u00f3n IV se basa en varios contadores de frame TDMA, que frecuentemente la infraestructura transmite sin autenticaci\u00f3n. Un adversario activo puede manipular la vista de estos contadores en una estaci\u00f3n m\u00f3vil, provocando la reutilizaci\u00f3n del flujo de claves. Al enviar mensajes manipulados al MS y analizar las respuestas del MS, se puede recuperar el flujo de claves de frames arbitrarios." } ], "id": "CVE-2022-24401", "lastModified": "2024-11-21T06:50:20.597", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "cert@ncsc.nl", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-19T10:15:09.510", "references": [ { "source": "cert@ncsc.nl", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tetraburst.com/" } ], "sourceIdentifier": "cert@ncsc.nl", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-323" } ], "source": "cert@ncsc.nl", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2022-24403 (GCVE-0-2022-24403)
Vulnerability from cvelistv5
Published
2023-12-05 13:54
Modified
2024-08-03 04:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Summary
The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ETSI | TETRA Standard |
Version: TA61 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:13:55.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related", "x_transferred" ], "url": "https://tetraburst.com/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "TETRA Standard", "vendor": "ETSI", "versions": [ { "status": "affected", "version": "TA61" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Midnight Blue" } ], "descriptions": [ { "lang": "en", "value": "The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:H/IR:H/AR:H/MAV:A/MAC:L/MPR:N/MUI:N/MS:U/MC:L/MI:N/MA:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "shortName": "NCSC-NL" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related" ], "url": "https://tetraburst.com/" } ], "title": "De-anonymization attack in TETRA" } }, "cveMetadata": { "assignerOrgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "assignerShortName": "NCSC-NL", "cveId": "CVE-2022-24403", "datePublished": "2023-12-05T13:54:32.045Z", "dateReserved": "2022-02-04T04:43:09.527Z", "dateUpdated": "2024-08-03T04:13:55.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24404 (GCVE-0-2022-24404)
Vulnerability from cvelistv5
Published
2023-10-19 09:31
Modified
2024-08-03 04:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-353 - Missing Support for Integrity Check
Summary
Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ETSI | TETRA Standard |
Version: all |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-24404", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T14:21:17.085076Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T14:21:24.663Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T04:13:55.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related", "x_transferred" ], "url": "https://tetraburst.com/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "TETRA Standard", "vendor": "ETSI", "versions": [ { "status": "affected", "version": "all" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Midnight Blue" } ], "descriptions": [ { "lang": "en", "value": "Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U/RL:U/RC:R/CR:H/IR:H/AR:H/MAV:A/MAC:H/MPR:N/MUI:N/MS:U/MC:N/MI:H/MA:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-353", "description": "Missing Support for Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "shortName": "NCSC-NL" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related" ], "url": "https://tetraburst.com/" } ], "title": "Ciphertext Malleability in TETRA" } }, "cveMetadata": { "assignerOrgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "assignerShortName": "NCSC-NL", "cveId": "CVE-2022-24404", "datePublished": "2023-10-19T09:31:43.802Z", "dateReserved": "2022-02-04T04:43:09.528Z", "dateUpdated": "2024-08-03T04:13:55.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24402 (GCVE-0-2022-24402)
Vulnerability from cvelistv5
Published
2023-10-19 09:32
Modified
2024-09-12 20:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-334 - Small Space of Random Values
Summary
The TETRA TEA1 keystream generator implements a key register initialization function that compresses the 80-bit key to only 32 bits for usage during the keystream generation phase, which is insufficient to safeguard against exhaustive search attacks.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ETSI | TETRA Standard |
Version: TEA1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:13:55.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related", "x_transferred" ], "url": "https://tetraburst.com/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-24402", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T20:31:22.585350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T20:31:31.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "TETRA Standard", "vendor": "ETSI", "versions": [ { "status": "affected", "version": "TEA1" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Midnight Blue" } ], "descriptions": [ { "lang": "en", "value": "The TETRA TEA1 keystream generator implements a key register initialization function that compresses the 80-bit key to only 32 bits for usage during the keystream generation phase, which is insufficient to safeguard against exhaustive search attacks." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C/CR:H/IR:H/AR:H/MAV:A/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-334", "description": "Small Space of Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "shortName": "NCSC-NL" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related" ], "url": "https://tetraburst.com/" } ], "title": "Intentionally weakened effective strength in TETRA TEA1" } }, "cveMetadata": { "assignerOrgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "assignerShortName": "NCSC-NL", "cveId": "CVE-2022-24402", "datePublished": "2023-10-19T09:32:23.476Z", "dateReserved": "2022-02-04T04:43:09.527Z", "dateUpdated": "2024-09-12T20:31:31.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24400 (GCVE-0-2022-24400)
Vulnerability from cvelistv5
Published
2023-10-19 09:33
Modified
2024-09-12 20:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-807 - Reliance on Untrusted Inputs in a Security Decision
Summary
A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ETSI | TETRA Standard |
Version: all |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:13:55.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related", "x_transferred" ], "url": "https://tetraburst.com/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-24400", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T20:29:57.134658Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T20:30:58.123Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "TETRA Standard", "vendor": "ETSI", "versions": [ { "status": "affected", "version": "all" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Midnight Blue" } ], "descriptions": [ { "lang": "en", "value": "A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R/CR:H/IR:H/AR:H/MAV:A/MAC:H/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-807", "description": "Reliance on Untrusted Inputs in a Security Decision", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "shortName": "NCSC-NL" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related" ], "url": "https://tetraburst.com/" } ], "title": "DCK pinning attack in TETRA" } }, "cveMetadata": { "assignerOrgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "assignerShortName": "NCSC-NL", "cveId": "CVE-2022-24400", "datePublished": "2023-10-19T09:33:28.366Z", "dateReserved": "2022-02-04T04:43:09.526Z", "dateUpdated": "2024-09-12T20:30:58.123Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24401 (GCVE-0-2022-24401)
Vulnerability from cvelistv5
Published
2023-10-19 09:32
Modified
2024-08-03 04:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-323 - Reusing a Nonce, Key Pair in Encryption
Summary
Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ETSI | TETRA Standard |
Version: all |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:13:55.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related", "x_transferred" ], "url": "https://tetraburst.com/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "TETRA Standard", "vendor": "ETSI", "versions": [ { "status": "affected", "version": "all" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Midnight Blue" } ], "descriptions": [ { "lang": "en", "value": "Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C/CR:H/IR:H/AR:H/MAV:A/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-323", "description": "Reusing a Nonce, Key Pair in Encryption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T00:27:54.327174Z", "orgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "shortName": "NCSC-NL" }, "references": [ { "name": "TETRA:BURST", "tags": [ "related" ], "url": "https://tetraburst.com/" } ], "title": "Keystream recovery for arbitrary frames in TETRA" } }, "cveMetadata": { "assignerOrgId": "cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39", "assignerShortName": "NCSC-NL", "cveId": "CVE-2022-24401", "datePublished": "2023-10-19T09:32:53.702Z", "dateReserved": "2022-02-04T04:43:09.526Z", "dateUpdated": "2024-08-03T04:13:55.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }