First published: Thu Oct 19 2023(Updated: )
The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400.
Credit: cert@ncsc.nl cert@ncsc.nl
Affected Software | Affected Version | How to fix |
---|---|---|
Motorola Mtm5500 Firmware | ||
Motorola Mtm5500 | ||
Motorola Mtm5400 Firmware | ||
Motorola Mtm5400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26943 is a vulnerability present in the Motorola MTM5000 series firmwares, where the TETRA authentication challenges are generated using a PRNG with limited boot time entropy and limited re-seeding, making them vulnerable to attacks.
CVE-2022-26943 has a severity score of 8.8 (high).
Motorola Mtm5500 Firmware and Motorola Mtm5400 Firmware are affected by CVE-2022-26943.
The vulnerability in CVE-2022-26943 can be exploited through two attacks due to the limited boot time entropy and limited re-seeding of the PRNG used for generating TETRA authentication challenges.
Motorola Mtm5500 and Motorola Mtm5400 are not vulnerable to CVE-2022-26943, only their respective firmwares are affected.