"Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications"

Following the discovery of vulnerabilities in the Terrestrial Trunked Radio (TETRA) communications protocol, which is used by Industrial Control Systems (ICS) worldwide, researchers have uncovered multiple additional zero-day vulnerabilities in a Motorola base station and system chip. Both are needed to execute and decrypt the TETRA communications algorithm, which may expose sensitive information. TETRA is a global standard for encrypted two-way communications devised by public safety experts. TETRA systems are used in public safety and industrial-commercial sectors, including utility companies, rail and metro lines, power stations, oil refineries, and chemical plants. Wouter Bokslag, co-founder of Midnight Blue, says that the base station has a Trusted Execution Environment (TEE) designed to prevent the exfiltration of cryptographic primitives and keys. However, he explains that through a side-channel attack on the TEE, his team was able to decrypt the module and get an AES key that could be used to decrypt further communications passing through the equipment. This article continues to discuss the TETRA-related vulnerabilities. 

Dark Reading reports "Raft of TETRA Zero-Day Vulnerabilities Endanger Industrial Communications"

Submitted by Anonymous on