Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

ETSI — Vulnerabilities & Security Advisories 5

Browse all 5 CVE security advisories affecting ETSI. AI-powered Chinese analysis, POCs, and references for each vulnerability.

ETSI develops global standards for information and communication technologies, enabling interoperability across diverse systems. Historically, vulnerabilities in ETSI implementations have commonly included remote code execution, cross-site scripting, and privilege escalation due to complex protocol implementations and web interfaces. While no major public security incidents have been widely documented, the organization's standards influence critical infrastructure, making potential vulnerabilities particularly significant. With five CVEs currently on record, these primarily relate to web application flaws and protocol implementation weaknesses. The organization's focus on standardizing technologies across sectors means vulnerabilities could have widespread impact if exploited in production environments using their specifications.

Top products by ETSI: TETRA Standard
CVE IDTitleCVSSSeverityPublished
CVE-2022-24403 De-anonymization attack in TETRA — TETRA StandardCWE-327 4.3 Medium2023-12-05
CVE-2022-24400 DCK pinning attack in TETRA — TETRA StandardCWE-807 7.5 High2023-10-19
CVE-2022-24401 Keystream recovery for arbitrary frames in TETRA — TETRA StandardCWE-323 8.8 High2023-10-19
CVE-2022-24402 Intentionally weakened effective strength in TETRA TEA1 — TETRA StandardCWE-334 8.8 High2023-10-19
CVE-2022-24404 Ciphertext Malleability in TETRA — TETRA StandardCWE-353 5.9 Medium2023-10-19

This page lists every published CVE security advisory associated with ETSI. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.