No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Zero-Day Vulnerabilities Discovered in Global Emergency Services Communications Protocol

July 25, 2023
in Protection
0
Zero-Day Vulnerabilities Discovered in Global Emergency Services Communications Protocol



A radio communications protocol used by emergency services worldwide harbors several critical vulnerabilities that could allow adversaries to spy on or manipulate the transmissions, researchers found.

Terrestrial Trunked Radio (TETRA) is a radio voice and data standard mainly used by emergency services, such as police, fire brigade, and military, as well as in some industrial environments.

Multiple TETRA secure channels offer key management, voice, and data encryption, while the TETRA Encryption Algorithm (TEA1) implements the actual encryption algorithms that ensure that data is confidentially communicated over the air.

Researchers from Midnight Blue Labs found five vulnerabilities in TETRA — with CVE-2022-24402 and CVE-2022-24401 both rated as critical. Collectively, the zero-day vulnerabilities are known as “TETRA:BURST.” The researchers will present their findings at Black Hat USA next month.

Depending on infrastructure and device configurations, these vulnerabilities allow for real-time or delayed decryption, message injection, user deanonymization, or session key pinning attacks. Practically, these vulnerabilities allow high-end adversaries to listen in on police and military communications, track their movements, or manipulate critical infrastructure network communications carried over TETRA.

Time for TEA?

In a demonstration video of CVE-2022-24401, researchers showed that an attacker would be able to capture the encrypted message by targeting a radio to which the message was being sent. Midnight Blue founding partner Wouter Bokslag says that in none of the circumstances for this vulnerability do you get your hands on a key: “The only thing is you’re getting is the key stream, which you can use to decrypt, arbitrary frames, or arbitrary messages that go over the network.”

A second demonstration video of CVE-2022-24402 reveals that there is a backdoor in the TEA1 algorithm that affects networks relying on TEA1 for confidentiality and integrity. It was also discovered that the TEA1 algorithm uses an 80-bit key that an attacker could do a brute-force attack on, and listen in to the communications undetected.

Bokslag admits that using the term backdoor is strong, but it is justified in this instance. “As you feed an 80 bits key to TEA1, that flows through a reduction step and which leaves it with only 32 bits of key material, and it will carry on doing the decryption with only those 32 bits,” he says.

Bokslag says this weakening of the cipher would allow an attacker to exhaustively search through the 32 bits, and decrypt all the traffic with very cheap hardware. This would only require a $10 USB dongle to receive signals, and using a standard laptop an attacker would have access until the key changes — and in many cases, the key is never changed, so the attacker would have permanent access to communications.

Why Research This in the First Place?

Admitting that “proprietary cryptography has repeatedly suffered from practically exploitable flaws which remain unaddressed until disclosed,” the researchers said their goal was to open up TETRA for public review, perform a risk analysis, resolve issues, and create a level playing field.

The researchers also said the intention was to gain a better understanding of TETRA security, ensure identified issues are resolved and promote the use of open cryptography.

“The interesting thing about this technology is that the use cases which are quite sensitive, and the cryptography that’s supposed to secure communications is secret,” Bokslag says.

First published in 1995 by the European Telecommunications Standards Institute (ETSI), TETRA is one of the most widely used professional mobile radio standards — especially for law enforcement — and has been in continuous use for decades for voice, data, and machine-to-machine communications.

While most of the TETRA standard is open, its security relies on a set of secret, proprietary cryptographic algorithms that are distributed only under strict nondisclosure agreement to a limited number of parties. The researchers also found a mention of TETRA in the 2013 Edward Snowden leaks, especially in the interception of TETRA communications.

Fixing the Holes

Bokslag admits some of the issues quite easily can be resolved through firmware updates, including CVE-2022-24401. However, CVE-2022-24402 is not fixable through firmware updates because they are part of the standard.

“You cannot work around it,” Bokslag says. “For TEA1, you could apply end-to-end encryption as a solution, but it’s going to be very costly and very labor intensive to roll out.”

Users in more than 100 countries will be affected by these vulnerabilities, as well as most sectors of industry, including law enforcement as well as military and intelligence services, he says. The researchers have been in contact with manufacturers and network operators in order to help them resolve these issues as much as they can. “This has been the first public in-depth security analysis of TETRA in its existence, which is now almost 30 years,” he says.

“No one is allowed to know what TEA [versions] 5, 6, and 7 will involve,” Bokslag adds. “The authentication mechanisms are once again going to be to be secret. There are not yet any solutions in the market, but manufacturers are working on them.”

Bokslag says manufacturers have developed patches for the vulnerabilities in response to the research. Midnight Blue recommends migrating from TEA1 to another TEA cipher for now.

Editorial Team

Editorial Team

Related Posts

What AI Body Scans Can (and Cannot) Tell You
Protection

What AI Body Scans Can (and Cannot) Tell You

May 8, 2026
This 100-Inch Hisense QLED TV Gets Super Bright, and It's $1,200 Off Right Now
Protection

This 100-Inch Hisense QLED TV Gets Super Bright, and It’s $1,200 Off Right Now

May 8, 2026
Canvas Has Been Hacked, and Is Being Held for Ransom
Protection

Canvas Has Been Hacked, and Is Being Held for Ransom

May 7, 2026
10 Hacks Every Zoom User Should Know
Protection

10 Hacks Every Zoom User Should Know

May 7, 2026
I’m a Weightlifter, and This Is How I’m Training for a Hyrox Race
Protection

I’m a Weightlifter, and This Is How I’m Training for a Hyrox Race

May 7, 2026
The EF EcoFlow Delta 3 Ultra Plus Portable Power Station Is 32% Off Right Now
Protection

The EF EcoFlow Delta 3 Ultra Plus Portable Power Station Is 32% Off Right Now

May 7, 2026
Load More
Next Post
TXN Stock: Texas Instruments Tops Views On Auto Chip Sales

TXN Stock: Texas Instruments Tops Views On Auto Chip Sales

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • How To Finally Find Time For What Matters With Backwards Planning · Primer

    0 shares
    Share 0 Tweet 0
  • 35 Most Beautiful Beaches in Europe, From Turkey to Portugal

    0 shares
    Share 0 Tweet 0
  • Here’s When SMART Goals Aren’t a Good Idea (and What to Use Instead)

    0 shares
    Share 0 Tweet 0
  • Unstaking Move By Ethereum Foundation Draws Market Focus, A Sell-Off On The Horizon?

    0 shares
    Share 0 Tweet 0

Latest News

Aptos Foundation and Labs back AI future with $50M fund - 1

Aptos Foundation and Labs back AI future with $50M fund

May 8, 2026
0

Aptos Foundation and Aptos Labs have committed more than $50 million to grow the Aptos ecosystem.  Summary Aptos Foundation and...

Tracy McGrady: The Thunder’s playoff prowess poses major challenges, Bulls’ management is a disaster, and Sixers miss opportunities with Jared McCain

Tracy McGrady: The Thunder’s playoff prowess poses major challenges, Bulls’ management is a disaster, and Sixers miss opportunities with Jared McCain

May 8, 2026
0

Key takeaways The Thunder are a formidable team, posing significant challenges for their opponents. The Bulls are currently viewed as...

Program Manager, Shipyard Workforce Development and Training

Program Manager, Shipyard Workforce Development and Training

May 8, 2026
0

Job Number: 050520262Closing Date: 6/4/2026 11:59 PM EasternPosition Description Hudson County Community CollegeProgram Manager, Shipyard Workforce Development and TrainingContinuing Education...

Xometry Q1 2026 slides: record results, guidance raised on Siemens deal

Xometry Q1 2026 slides: record results, guidance raised on Siemens deal

May 8, 2026
0

Xometry Q1 2026 slides: record results, guidance raised on Siemens deal

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.