How To Protect Your Identity Online

0
676

ICS/OTTETRA Radio Standard Vulnerabilities Can Expose Military Comms, Industrial Systems

Five vulnerabilities, two deemed to be critical, have been found in the Terrestrial Trunked Radio (TETRA) standard.

TETRA is the most widely used police radio communication system outside of the US. It is used by fire and ambulance services, transportation agencies, utilities, and military, border control and customs agencies in more than 100 nations globally — as well as the UN and NATO.

How To Protect Your Identity Online

The vulnerabilities were discovered by cybersecurity firm Midnight Blue (Amsterdam, Netherlands) with funding from NLnet as part of the EU NGI0 PET fund. Midnight Blue reverse-engineered the proprietary TETRA Authentication Algorithm (TAA1) and TETRA Encryption Algorithm (TEA) and analyzed them for the first time. In this process they discovered a series of vulnerabilities that they call TETRA:BURST.

The firm has announced basic details but will be providing full technical details during upcoming security conferences, including Black Hat and DEF CON in August. “We have spent over two and a half years on our TETRA research, including a coordinated disclosure process that lasted over one and a half years. We will fully disclose our research results and present our work at various conferences throughout the year,” say the researchers.

The five vulnerabilities are:

CVE-2022-24401, critical: allows decryption oracle attacks leading to a loss of confidentiality and authenticity.

CVE-2022-24402, critical: a backdoor in the TEA1 encryption algorithm allows trivial brute-forcing on keys leading to a loss of confidentiality and authenticity.

CVE-2022-24404, high: lack of authentication on AIE allowing malleability attacks leading to a loss of authentication.

CVE-2022-24403, high: weak obfuscation on radio identities allowing user deanonymization.

CVE-2022-24400, high: a flaw in the authentication algorithm can lead to a loss of authenticity and a partial loss of confidentiality.

Midnight Blue calls out the first and third vulnerabilities as of immediate concern. “This could allow high-end adversaries to intercept or manipulate law enforcement and military radio communications.”

The company also raised concerns over the TEA1 encryption backdoor, which could pose a serious risk to critical infrastructure operators and their industrial control systems (ICS).

“By exploiting this issue, attackers can not only intercept radio communications of private security services at harbors, airports, and railways but can also inject data traffic used for monitoring and control of industrial equipment. As an example, electrical substations can wrap telecontrol protocols in encrypted TETRA to have SCADA systems communicate with Remote Terminal Units (RTUs) over a Wide-area Network (WAN). Decrypting this traffic and injecting malicious traffic allows an attacker to potentially perform dangerous actions such as opening circuit breakers in electrical substations or manipulate railway signaling messages,” Midnight Blue explains.

Patches and mitigations (such as the use of E2EE) are specified.

The Hub for Industrial Cybersecurity - Join us in Atlanta

William Wright, CEO at Closed Door Security, commented, “This is an extremely concerning discovery from security researchers. No system, whether critical or trivial, should ever be marketed or deployed without continuous and proactive security testing.” It seems that too much reliance for security was placed on the proprietary nature of the TETRA standard.

He points out that since criminals are constantly looking for weaknesses in systems they can exploit to gain access to data, there is a possibility these bugs have already been discovered and used in the wild. “Furthermore,” he adds, “given the types of industries that rely on TETRA radio communications, this could have given adversaries access to sensitive information that could be extremely dangerous in their hands.”

Spread the love

Have questions? Let's talk.

Jypra Group experts are ready to answer your questions.

Contact Us

QUICK LINKS

Home

Who we are

Managed Cyber Security

Professional services

Contact Us

CONTACT

Level 10, 900 Ann Street, Fortitude Valley, 4006

[email protected]

Design & Developed by Inertiasoft Pvt Ltd

 

About Company:

At Jypra Group, we offer comprehensive, 365/24/7 cybersecurity and managed IT services tailored to protect your business from evolving threats. Our suite of services includes advanced endpoint security monitoring, malware and ransomware protection, threat detection and response, and business email compromise protection. We also provide proactive measures such as vulnerability assessments, mobile and network security, penetration testing, and data loss prevention to ensure a secure and resilient IT environment for your business.

Click Here For More Info:-  https://jypragroup.com.au/

Social Media Profile Links:-

https://x.com/JypraGroup

https://www.instagram.com/jypragroup

Поиск
Спонсоры
Категории
Больше
Sports
Guide
Guide The system construction in the CR (and everywhere) beneath twelve year presidency of Vaclav...
От andrewrihana421 2024-10-23 10:57:56 0 865
Technology
Liquid Fertilizer Market Growth: Projections Point to a USD 3.52 Billion Valuation by 2030"
Global Liquid Fertilizer Market Outlook Liquid Fertilizer Market Size was valued at USD 2.70...
От myblog 2023-12-12 11:21:22 0 2Кб
Other/General
Boost Your Social Presence with Quality Instagram Followers India
Having a great Instagram presence is becoming a commercial need rather than just a fad in the...
От officewebmaster315 2025-04-24 09:19:32 0 216
Other/General
Multi-vitamin For Women With Iron
Revitalize your well-being with Livegood's innovative range of health solutions. Experience the...
От andrewrihana421 2023-11-28 05:10:30 0 1Кб
Health
Glioblastoma Multiforme Treatment Market Analysis, Industry, 2023 global business Insights Report
Glioblastoma Multiforme Treatment Market Analysis  Scope & Overview The...
От wilsonbhosale 2024-01-24 07:01:07 0 1Кб