:mastodon: decio<p>"Vulnerabilities in TCAS II collision warning system for civil aircraft identified by CYD Campus ((NDR Cyber_Defence Campus))</p><p>"The CYD Campus has subjected the Traffic Alert and Collision Avoidance System (TCAS) II used in civil aviation to a comprehensive technical security analysis. The manufacturers and aviation authorities in Europe and the United States have been informed. The published vulnerabilities were classified as moderate and severe, respectively, by the US Cyber Defense Agency CISA and the Federal Aviation Authority (FAA) of the United States.."</p><p>"In autumn 2023, the team succeeded in triggering false warnings on a pilot cockpit in their laboratory using a certified TCAS processor from Garmin with its own radio setup. These results were then demonstrated at the DEF CON hacker conference in Las Vegas and at the Usenix security conference in Philadelphia in summer 2024."<br>👇 <br><a href="https://www.cydcampus.admin.ch/en/vulnerabilities-in-tcas-ii-collision-warning-system-for-civil-aircraft-identified-by-cyd-campus" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cydcampus.admin.ch/en/vulnerab</span><span class="invisible">ilities-in-tcas-ii-collision-warning-system-for-civil-aircraft-identified-by-cyd-campus</span></a></p><p>[related presntation]<br>⬇️ <br>"On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS)"<br>👇 <br><a href="https://www.usenix.org/conference/usenixsecurity24/presentation/longo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">usenix.org/conference/usenixse</span><span class="invisible">curity24/presentation/longo</span></a></p><p>[related CISA advisory]<br>⬇️ <br>"Traffic Alert and Collision Avoidance System (TCAS) II"<br>⬇️ <br>( CVE-2024-9310 )By utilizing software-defined radios and a custom low-latency processing pipeline, RF signals with spoofed location data can be transmitted to aircraft targets. This can lead to the appearance of fake aircraft on displays and potentially trigger undesired Resolution Advisories"<br>⬇️ <br>( CVE-2024-11166 ) For TCAS II systems using transponders compliant with MOPS earlier than RTCA DO-181F, an attacker can impersonate a ground station and issue a Comm-A Identity Request. This action can set the Sensitivity Level Control (SLC) to the lowest setting and disable the Resolution Advisory (RA), leading to a denial-of-service condition."<br>👇 <br><a href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-01" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/ics-advis</span><span class="invisible">ories/icsa-25-021-01</span></a></p><p><a href="https://infosec.exchange/tags/CyberVeille" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/aviation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aviation</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/TCAS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCAS</span></a></p>