Multiple TETRA Radio Encryption Vulnerabilities Disclosed
Summary
Hide ▲
Show ▼
New vulnerabilities in the Terrestrial Trunked Radio (TETRA) communications protocol were disclosed, affecting its end-to-end encryption (E2EE) mechanism. These flaws, collectively named 2TETRA:2BURST, enable replay and brute-force attacks, potentially allowing attackers to decrypt and inject traffic into TETRA networks. The vulnerabilities impact law enforcement, military, transportation, utilities, and critical infrastructure operators using TETRA. The issues were presented at the Black Hat USA 2025 conference by Midnight Blue researchers. The vulnerabilities include packet injection, insufficient fixes for previous flaws, and weaknesses in encryption algorithms that reduce effective key entropy. The impact varies based on the use-case and configuration of each TETRA network. Networks using TETRA for data transmission are particularly susceptible to packet injection attacks, which could allow attackers to intercept and inject malicious data traffic.
Timeline
-
11.08.2025 19:32 1 articles · 1mo ago
Multiple TETRA Radio Encryption Vulnerabilities Disclosed
New vulnerabilities in the TETRA communications protocol were disclosed, affecting its end-to-end encryption (E2EE) mechanism. These flaws, collectively named 2TETRA:2BURST, enable replay and brute-force attacks, potentially allowing attackers to decrypt and inject traffic into TETRA networks. The vulnerabilities include packet injection, insufficient fixes for previous flaws, and weaknesses in encryption algorithms that reduce effective key entropy. The impact varies based on the use-case and configuration of each TETRA network. Networks using TETRA for data transmission are particularly susceptible to packet injection attacks, which could allow attackers to intercept and inject malicious data traffic.
Show sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
Information Snippets
-
TETRA is a European mobile radio standard widely used by law enforcement, military, transportation, utilities, and critical infrastructure operators.
First reported: 11.08.2025 19:321 source, 1 articleShow sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
-
The vulnerabilities, named 2TETRA:2BURST, were disclosed at the Black Hat USA 2025 conference by Midnight Blue researchers.
First reported: 11.08.2025 19:321 source, 1 articleShow sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
-
The flaws affect the TETRA protocol's end-to-end encryption (E2EE) mechanism, enabling replay and brute-force attacks.
First reported: 11.08.2025 19:321 source, 1 articleShow sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
-
The vulnerabilities include packet injection, insufficient fixes for previous flaws, and weaknesses in encryption algorithms.
First reported: 11.08.2025 19:321 source, 1 articleShow sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
-
The impact of the vulnerabilities depends on the use-case and configuration of each TETRA network.
First reported: 11.08.2025 19:321 source, 1 articleShow sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
-
Networks using TETRA for data transmission are particularly susceptible to packet injection attacks.
First reported: 11.08.2025 19:321 source, 1 articleShow sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
-
The vulnerabilities include CVE-2025-52940, CVE-2025-52941, CVE-2025-52942, CVE-2025-52943, and CVE-2025-52944, along with MBPH-2025-001 and MBPH-2025-003.
First reported: 11.08.2025 19:321 source, 1 articleShow sources
- New TETRA Radio Encryption Flaws Expose Law Enforcement Communications — thehackernews.com — 11.08.2025 19:32
Similar Happenings
Russian FSB-linked Hackers Exploit Cisco Smart Install Vulnerability for Cyber Espionage
Static Tundra, a Russian state-sponsored cyber espionage group linked to the FSB's Center 16 unit, has been actively exploiting a seven-year-old vulnerability in Cisco IOS and IOS XE software (CVE-2018-0171) to gain persistent access to target networks. The group has been targeting organizations in telecommunications, higher education, manufacturing, and critical infrastructure sectors across multiple continents. The attacks involve collecting configuration files, deploying custom tools like SYNful Knock, and modifying TACACS+ configurations to achieve long-term access and information gathering. The FBI and Cisco Talos have issued advisories warning about the ongoing campaign, which has been active for over a year and has targeted critical infrastructure sectors in the US and abroad. The group has also increased attacks on Ukraine since the start of the war. The vulnerability allows unauthenticated, remote attackers to execute arbitrary code or trigger DoS conditions. Cisco has advised customers to apply the patch for CVE-2018-0171 or disable Smart Install to mitigate the risk. The group has also targeted networks of US state, local, territorial, and tribal (SLTT) government organizations and aviation entities over the last decade. The threat extends beyond Russia's operations—other state-sponsored actors are likely conducting similar network device compromise campaigns.