Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion.
Exploitability
AV:AAC:HPR:NUI:NScope
S:UImpact
C:NI:HA:L5.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:LOther