For TCAS II systems using transponders compliant with MOPS earlier than RTCA DO-181F, an attacker can impersonate a ground station and issue a Comm-A Identity Request. This action can set the Sensitivity Level Control (SLC) to the lowest setting and disable the Resolution Advisory (RA), leading to a denial-of-service condition.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 22 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | For TCAS II systems using transponders compliant with MOPS earlier than RTCA DO-181F, an attacker can impersonate a ground station and issue a Comm-A Identity Request. This action can set the Sensitivity Level Control (SLC) to the lowest setting and disable the Resolution Advisory (RA), leading to a denial-of-service condition. | |
Title | Traffic Alert and Collision Avoidance System (TCAS) II has an External Control of System or Configuration Setting vulnerability | |
Weaknesses | CWE-15 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-02-12T17:08:00.961Z
Reserved: 2024-11-12T21:01:21.756Z
Link: CVE-2024-11166

Updated: 2025-02-12T17:07:46.891Z

Status : Received
Published: 2025-01-22T19:15:09.890
Modified: 2025-01-22T19:15:09.890
Link: CVE-2024-11166

No data.