← Back to CVEs
CVE-2022-26943
HIGH8.8
Description
The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/19/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
motorola:mtm5400motorola:mtm5400_firmwaremotorola:mtm5500motorola:mtm5500_firmware
Weaknesses (CWE)
CWE-338CWE-338
References
https://tetraburst.com/(cert@ncsc.nl)
https://tetraburst.com/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.