Browse all 5 CVE security advisories affecting ETSI. AI-powered Chinese analysis, POCs, and references for each vulnerability.
ETSI develops global standards for information and communication technologies, enabling interoperability across diverse systems. Historically, vulnerabilities in ETSI implementations have commonly included remote code execution, cross-site scripting, and privilege escalation due to complex protocol implementations and web interfaces. While no major public security incidents have been widely documented, the organization's standards influence critical infrastructure, making potential vulnerabilities particularly significant. With five CVEs currently on record, these primarily relate to web application flaws and protocol implementation weaknesses. The organization's focus on standardizing technologies across sectors means vulnerabilities could have widespread impact if exploited in production environments using their specifications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-24403 | De-anonymization attack in TETRA — TETRA StandardCWE-327 | 4.3 | Medium | 2023-12-05 |
| CVE-2022-24400 | DCK pinning attack in TETRA — TETRA StandardCWE-807 | 7.5 | High | 2023-10-19 |
| CVE-2022-24401 | Keystream recovery for arbitrary frames in TETRA — TETRA StandardCWE-323 | 8.8 | High | 2023-10-19 |
| CVE-2022-24402 | Intentionally weakened effective strength in TETRA TEA1 — TETRA StandardCWE-334 | 8.8 | High | 2023-10-19 |
| CVE-2022-24404 | Ciphertext Malleability in TETRA — TETRA StandardCWE-353 | 5.9 | Medium | 2023-10-19 |
This page lists every published CVE security advisory associated with ETSI. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.