Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

TETRA:BURST Vulnerabilities Revealed

July 26, 2023
Reading Time: 2 mins read
in Alerts
TETRA:BURST Vulnerabilities Revealed

 

A set of five security vulnerabilities in the Terrestrial Trunked Radio (TETRA) standard has been disclosed, potentially impacting sensitive information in government entities and critical infrastructure sectors.

Discovered by Midnight Blue in 2021 and collectively named TETRA:BURST, these vulnerabilities may allow real-time decryption, message injection, and user deanonymization. Despite no evidence of exploitation to date, the risks to TETRA-based radios, utilized in over 100 countries and controlling essential systems like power grids and railways, call for immediate action to address these serious issues.

TETRA:BURST, discovered by Midnight Blue, includes an intentional backdoor, leading to concerns about potential exposure of sensitive information in government entities and critical infrastructure sectors.

Despite no confirmed exploitation so far, the vulnerabilities enable real-time decryption and message injection, posing a significant threat to TETRA-based radios used widely in essential systems like power grids and railways. Immediate attention is crucial to protect against potential attacks and unauthorized access, given the severity of these flaws.

Midnight Blue’s disclosure of five security vulnerabilities, including a potential intentional backdoor, in the widely used TETRA standard raises alarm for government entities and critical infrastructure sectors.

These vulnerabilities may enable real-time decryption, user deanonymization, and message injection, necessitating swift action to address the risks. While no evidence of exploitation exists to date, the serious implications of TETRA:BURST demand immediate remediation efforts to safeguard sensitive information and essential systems.

TETRA, a widely used radio communication standard for government entities and critical infrastructure sectors, faces five critical vulnerabilities, including a possible intentional backdoor. Discovered by Midnight Blue in 2021, these issues collectively known as TETRA:BURST allow real-time decryption, message injection, and user deanonymization, posing significant risks to sensitive information and essential systems.

Despite no current evidence of exploitation, immediate action is necessary to mitigate the potential impact and secure TETRA-based radios used extensively worldwide.

Reference:
  • TETRA:BURST
Tags: Cyber AlertCyber Alerts 2023CybersecurityGovernmentJuly 2023sensitive informationTETRAVulnerabilities
ADVERTISEMENT

Related Posts

Android Malware Adds Stronger Data Theft

Sneeit RCE And ICTBroadcast Bug Power Attacks

December 8, 2025
Android Malware Adds Stronger Data Theft

MuddyWater Uses UDPGangster In Campaign

December 8, 2025
Android Malware Adds Stronger Data Theft

Android Malware Adds Stronger Data Theft

December 8, 2025
Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025

Latest Alerts

Sneeit RCE And ICTBroadcast Bug Power Attacks

MuddyWater Uses UDPGangster In Campaign

Android Malware Adds Stronger Data Theft

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Subscribe to our newsletter

    Latest Incidents

    Honduran Vote System Faces Security Breach

    Petco Confirms Data Exposure Incident

    Hackers Hit Major Russian Logistics Firm

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial