New TETRA Radio Encryption Flaws Expose Law Enforcement Communications

New TETRA Radio Encryption Flaws Expose Law Enforcement Communications

Cybersecurity researchers revealed critical vulnerabilities in the TETRA communication protocol, exposing it to replay, brute-force, and injection attacks that could compromise sensitive communications. These flaws particularly affect law enforcement, military, transportation, utilities, and critical infrastructure systems utilizing TETRA encryption algorithms like TEA1-4. #TETRA #2BURST

Keypoints

  • Researchers uncovered new security issues in the TETRA protocol, including in its E2EE mechanism.
  • Vulnerabilities allow packet injection, replay attacks, and brute-force decryption of encrypted traffic.
  • Weaknesses particularly impact networks supporting multiple encryption algorithms and data transmission.
  • No current patches fully address all identified vulnerabilities, with some fixes anticipated in the near future.
  • Operators should enhance security by implementing additional layers like TLS/VPN and switching to stronger encryption variants.

Read More: https://thehackernews.com/2025/08/new-tetra-radio-encryption-flaws-expose.html