TETRA tour de force: Jailbreaking digital radios and base stations for fun and secrets

Talk title: TETRA tour de force: Jailbreaking digital radios and base stations for fun and secrets

Wouter Bokslag and Carlo Meijer

Midnight Blue

WHERE: INRIA, Euler Violet

WHEN: October 16, 2023 11AM-12.20PM

This work was also presented at:

USENIX’23, paper here

BLACKHAT’23, slides

DEFCON’23, video

Abstract:
In this talk, we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a standard used globally by government agencies, police, prisons, and military operators as well as critical infrastructure such as SCADA telecontrol of oil rigs, pipelines, transportation and electric and water utilities.
For decades, the underlying algorithms have remained secret under restrictive NDAs prohibiting public scrutiny of this critical technology. In this talk, we will make public the TETRA cipher suites (TEA and TAA1 to be precise), one of the last bastions of widely deployed secret crypto, and discuss in-depth how we managed to obtain them.
We will discuss several different flaws we uncovered allowing passive or active adversaries to intercept and manipulate TETRA traffic, including details of a backdoored stream cipher.
This journey involved reverse-engineering and exploiting multiple 0-day vulnerabilities in the popular Motorola MTM5x00 radio and its TI OMAP-L138 TEE and covers everything from side-channel attacks on DSPs to writing your own decompilers. We will also discuss how we gained code execution on and instrumented a Motorola MBTS TETRA base station for research purposes.

Comments are closed.