Heimdal Security Blog

Terrestrial Trunked Radio System Vulnerable to Leakage and Message Injection

tetra:burst vulnerabilities

Dutch researchers revealed 5 vulnerabilities in the Terrestrial Trunked Radio (TETRA) that could expose government organizations and critical infrastructure communication to third parties.

Two of the collectively called TETRA:BURST flaws, CVE-2022-22401 and CVE-2022-22402, were rated critical.

TETRA is used for communication by police, fire and ambulance services, transportation agencies, utilities, military and border control organizations, UN, and NATO in over 100 countries worldwide. The TETRA:BURST vulnerabilities could enable threat actors to get access to and exfiltrate sensitive data and even alter law enforcement and military radio communication. Most of them impact all TETRA networks.

Depending on infrastructure and device configurations, these vulnerabilities allow for real time decryption, harvest-now-decrypt-later attacks, message injection, user deanonymization, or session key pinning

Source

Although there it is possible that the five CVEs have been also discovered by malicious actors, researchers claim there is yet no evidence of them being exploited in the wild.

The Five TETRA:BURST Vulnerabilities Described

The security researchers used reverse engineering techniques to discover the TETRA:BURST vulnerabilities. Rated from high to critical, the bugs allow ”practical interception and manipulation attacks by both passive and active adversaries”. (Source)

Threat actors can use them as follows:

Risk Mitigation and Further Advice

For the moment, patches are available only for CVE-2022-24401 and CVE-2022-24404 and should, of course, be applied.

Security specialists recommend using end-to-end encryption to mitigate CVE-2022-24402 and CVE-2022-24403 risks.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.