By utilizing software-defined radios and a custom low-latency processing pipeline, RF signals with spoofed location data can be transmitted to aircraft targets. This can lead to the appearance of fake aircraft on displays and potentially trigger undesired Resolution Advisories (RAs).
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 22 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | By utilizing software-defined radios and a custom low-latency processing pipeline, RF signals with spoofed location data can be transmitted to aircraft targets. This can lead to the appearance of fake aircraft on displays and potentially trigger undesired Resolution Advisories (RAs). | |
Title | Traffic Alert and Collision Avoidance System (TCAS) II has a Reliance on Untrusted Inputs in a Security Decision vulnerability | |
Weaknesses | CWE-807 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-02-12T20:41:24.185Z
Reserved: 2024-09-27T22:45:50.842Z
Link: CVE-2024-9310

Updated: 2025-02-12T20:33:53.961Z

Status : Received
Published: 2025-01-22T19:15:10.277
Modified: 2025-01-22T19:15:10.277
Link: CVE-2024-9310

No data.