TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

TETRABURST: 5 vulnerabilities (2 critical) in TETRA-based networks

29 pointsby _V_almost 2 years ago

2 comments

archoalmost 2 years ago
<a href="https:&#x2F;&#x2F;archive.is&#x2F;l8E51" rel="nofollow noreferrer">https:&#x2F;&#x2F;archive.is&#x2F;l8E51</a><p>-- Related --<p><i>Tetra radio tech used in vital infrastructure worldwide vulnerable</i> : <a href="https:&#x2F;&#x2F;nltimes.nl&#x2F;2023&#x2F;07&#x2F;24&#x2F;radio-tech-used-vital-infrastructure-worldwide-vulnerable-hackers-dutch-research" rel="nofollow noreferrer">https:&#x2F;&#x2F;nltimes.nl&#x2F;2023&#x2F;07&#x2F;24&#x2F;radio-tech-used-vital-infrastr...</a><p><i>Code Kept Secret for Years Reveals Its Flaw–A Backdoor</i> : <a href="https:&#x2F;&#x2F;www.wired.com&#x2F;story&#x2F;tetra-radio-encryption-backdoor&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.wired.com&#x2F;story&#x2F;tetra-radio-encryption-backdoor&#x2F;</a><p><i>Terrestrial Trunked Radio (TETRA) – (Trans-European Trunked Radio)</i> : <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Terrestrial_Trunked_Radio" rel="nofollow noreferrer">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Terrestrial_Trunked_Radio</a><p>Comment by rasz : <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=36855269">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=36855269</a>
_V_almost 2 years ago
TETRA:BURST is a collection of five vulnerabilities, two of which are deemed critical, affecting the Terrestrial Trunked Radio (TETRA) standard used globally by law enforcement, military, critical infrastructure, and industrial asset owners in the power, oil &amp; gas, water, and transport sectors and beyond.<p>Most of the TETRA:BURST vulnerabilities affect all TETRA networks. Depending on infrastructure and device configurations, these vulnerabilities allow for realtime decryption, harvest-now-decrypt-later attacks, message injection, user deanonymization, or session key pinning. Firmware patches are available for some of these vulnerabilities, while compensating controls are recommended for others.