Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c3v3-8wvp-5mg4

Опубликовано: 19 окт. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.

Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.

EPSS

Процентиль: 40%
0.00183
Низкий

8.8 High

CVSS3

Дефекты

CWE-323
CWE-639

Связанные уязвимости

CVSS3: 8.8
nvd
больше 2 лет назад

Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.

EPSS

Процентиль: 40%
0.00183
Низкий

8.8 High

CVSS3

Дефекты

CWE-323
CWE-639