[{"name":"S3-234407","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44070,"status":"revised","reservation_date":"2023-10-19 06:55:40","uploaded":"2023-10-19 07:00:13","revisionof":"","revisedto":"S3-234408","release":"Rel-18","crspec":33.511,"crspecversion":"18.1.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":50.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234407.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234408","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44080,"status":"withdrawn","reservation_date":"2023-10-19 07:05:31","uploaded":"2023-10-19 07:09:46","revisionof":"S3-234407","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.1.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":50.0,"crrevision":1.0,"crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234408.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234409","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44090,"status":"withdrawn","reservation_date":"2023-10-19 07:13:18","uploaded":"2023-10-19 07:16:25","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.501,"crspecversion":"17.11.1","workitem":[{"winame":"eSCAS_5G"}],"crnumber":1792.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234409.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234410","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44100,"status":"withdrawn","reservation_date":"2023-10-19 07:20:36","uploaded":"2023-10-19 07:22:40","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.511,"crspecversion":"16.10.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":51.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234410.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234411","title":"Clarification on SCAS Modal Text","source":"T-Mobile USA Inc., Deutsche Telekom, ZTE Corporation, BSI, Nokia, Ericson, Huawei, Telus, MITRE Corporation","contact":"Mike Parsel","contact-id":87113,"tdoctype":"CR","for":"Approval","abstract":"Ensure the TS follows the ETSI Modal verbs terminology as described in the ETSI drafting rules.  Corrections on use are made throughout the TS.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44110,"status":"agreed","reservation_date":"2023-10-19 13:07:13","uploaded":"2023-10-22 13:44:22","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":128.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234411.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234412","title":"Clarification on SCAS Definitions and abbreviations","source":"T-Mobile USA Inc.T-Mobile US, Deutsche Telekom, ZTE Corporation, BSI, Nokia, Ericson, Huawei, Telus, MITRE Corporation","contact":"Mike Parsel","contact-id":87113,"tdoctype":"CR","for":"Approval","abstract":"Update undefined terms, missing definitions, missing abbreviations and references.","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44120,"status":"revised","reservation_date":"2023-10-19 15:01:19","uploaded":"2023-10-22 13:44:22","revisionof":"","revisedto":"S3-235108","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":129.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234412.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234413","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44130,"status":"revised","reservation_date":"2023-10-20 06:14:00","uploaded":"2023-10-20 06:19:07","revisionof":"","revisedto":"S3-234982","release":"Rel-18","crspec":33.511,"crspecversion":"18.1.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":52.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234413.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234414","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44140,"status":"revised","reservation_date":"2023-10-20 06:25:05","uploaded":"2023-10-20 06:27:58","revisionof":"","revisedto":"S3-234983","release":"Rel-17","crspec":33.511,"crspecversion":"17.4.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":53.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234414.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234415","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Feng-Ming Yang","contact-id":102448,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44150,"status":"revised","reservation_date":"2023-10-20 06:31:55","uploaded":"2023-10-20 06:34:18","revisionof":"","revisedto":"S3-234984","release":"Rel-16","crspec":33.511,"crspecversion":"16.10.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":54.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234415.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234423","title":"Clarification of Test Cases in TS 33.117","source":"Deutsche Telekom AG, T-Mobile US, Telecom Italia Mobile, Telus,China Mobile,Ericsson, Huawei, Nokia, ZTE, BSI (Germany), MITRE Corporation","contact":"Sven Lachmund","contact-id":62366,"tdoctype":"discussion","for":"Decision","abstract":"Some test case descriptions in TS 33.117 use imprecise wording, which leaves room for interpretations. This implies that security testers do not clearly know what to do. As ISO 17025 requires test labs to perform repeatable and reproduceable tests, it is","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44230,"status":"endorsed","reservation_date":"2023-10-23 07:55:29","uploaded":"2023-10-23 14:41:58","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234423.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234435","title":"Basic Editorial Updates to TS 33.117","source":"ZTE Corporation, Deutsche Telekom, T-Mobile USA, BSI, Huawei, Nokia, Ericsson, Telus, MITRE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/24\/2023. Original source : ZTE Corporation.","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44350,"status":"agreed","reservation_date":"2023-10-24 10:32:51","uploaded":"2023-10-24 10:38:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":131.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234435.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"2, 4.1.1, 4.2.2.2.3.1, 4.2.2.2.3.2, 4.2.3.2.2, 4.2.3.2.3, 4.2.3.2.4, 4.2.3.2.5, 4.2.3.3, 4.2.3.4, 4.2.3.5, 4.2.3.6, 4.2.4.1, 4.2.4.2.2, 4.2.5, 4.2.6.2, 4.3.2, 4.3.3, 4.3.4.2, 4.3.4.3, 4.3.4.4, 4.3.4.5, 4.3.4.6, 4.3.4.7, 4.3.4.8, 4.3.4.9, 4.3.4.10, 4.3.4.11, 4.3.4.12, 4.3.4.13, 4.3.4.14, 4.3.5.1, 4.3.6.2, 4.4.2, 4.4.3, 4.4.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234436","title":"Inconsistent use of terms","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"draftCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44360,"status":"approved","reservation_date":"2023-10-24 11:40:29","uploaded":"2023-10-27 05:50:33","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234436.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234438","title":"Specification mismatch is leading to inconsistent certification result","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44380,"status":"noted","reservation_date":"2023-10-24 14:09:19","uploaded":"2023-10-27 05:50:33","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234438.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234439","title":"Disclaimer for Indirect Communication","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44390,"status":"revised","reservation_date":"2023-10-24 14:11:39","uploaded":"2023-10-27 05:50:33","revisionof":"","revisedto":"S3-235050","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":132.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234439.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234738","title":"Clarification EMS interface","source":"China Mobile","contact":"Minpeng Qi","contact-id":96954,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":47380,"status":"agreed","reservation_date":"2023-10-30 10:33:06","uploaded":"2023-10-30 11:20:13","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.927,"crspecversion":"18.0.1","workitem":[{"winame":"VNP_SECAM_SCAS"}],"crnumber":1.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231346","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234738.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234739","title":"Correction for VNF package and VNF image integrity of clause 4.2.3.3.5.2","source":"China Mobile","contact":"Minpeng Qi","contact-id":96954,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : China Mobile","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":47390,"status":"agreed","reservation_date":"2023-10-30 10:33:07","uploaded":"2023-10-30 11:20:13","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.527,"crspecversion":"18.0.1","workitem":[{"winame":"VNP_SECAM_SCAS"}],"crnumber":1.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231346","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234739.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.3.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234842","title":"Correction of protocol in Expected format of evidence","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":48420,"status":"revised","reservation_date":"2023-10-30 11:31:03","uploaded":null,"revisionof":"","revisedto":"S3-234950","release":"Rel-18","crspec":33.513,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":14.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234844","title":"Added missing Test Name and Expected format of evidence","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":48440,"status":"revised","reservation_date":"2023-10-30 11:33:03","uploaded":null,"revisionof":"","revisedto":"S3-234952","release":"Rel-18","crspec":33.514,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":10.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234845","title":"Correction of IE and protocol","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":48450,"status":"revised","reservation_date":"2023-10-30 11:34:32","uploaded":null,"revisionof":"","revisedto":"S3-234951","release":"Rel-18","crspec":33.515,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":11.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234847","title":"Added UDM threat reference for use of an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":48470,"status":"revised","reservation_date":"2023-10-30 11:37:18","uploaded":null,"revisionof":"","revisedto":"S3-234953","release":"Rel-18","crspec":33.926,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":80.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234848","title":"Added UDM SCAS test cases for checking an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":48480,"status":"revised","reservation_date":"2023-10-30 11:38:48","uploaded":null,"revisionof":"","revisedto":"S3-234954","release":"Rel-18","crspec":33.514,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":11.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234929","title":"Add UDM SCAS test case for checking the authentication verification of a synchronization failure message","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49290,"status":"revised","reservation_date":"2023-10-30 13:10:37","uploaded":null,"revisionof":"","revisedto":"S3-234955","release":"Rel-19","crspec":33.514,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":12.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234930","title":"Add UDM threat reference for missing verification of synchronization failure messages.","source":"BSI (DE)","contact":"Michael Doubrava","contact-id":97342,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49300,"status":"revised","reservation_date":"2023-10-30 13:12:10","uploaded":null,"revisionof":"","revisedto":"S3-234956","release":"Rel-19","crspec":33.926,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":81.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234950","title":"Correction of protocol in Expected format of evidence","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49500,"status":"agreed","reservation_date":"2023-10-30 13:39:13","uploaded":"2023-10-30 13:48:38","revisionof":"S3-234842","revisedto":"","release":"Rel-18","crspec":33.513,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":14.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234950.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234951","title":"Correction of IE and protocol","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49510,"status":"agreed","reservation_date":"2023-10-30 13:39:56","uploaded":"2023-10-30 13:48:45","revisionof":"S3-234845","revisedto":"","release":"Rel-18","crspec":33.515,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":11.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234951.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234952","title":"Added missing Test Name and Expected format of evidence","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49520,"status":"agreed","reservation_date":"2023-10-30 13:40:55","uploaded":"2023-10-30 13:48:51","revisionof":"S3-234844","revisedto":"","release":"Rel-18","crspec":33.514,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":10.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234952.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234953","title":"Added UDM threat reference for use of an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49530,"status":"agreed","reservation_date":"2023-10-30 13:41:35","uploaded":"2023-10-30 13:48:57","revisionof":"S3-234847","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":80.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234953.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234954","title":"Added UDM SCAS test cases for checking an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49540,"status":"revised","reservation_date":"2023-10-30 13:42:19","uploaded":"2023-10-30 13:49:03","revisionof":"S3-234848","revisedto":"S3-235043","release":"Rel-18","crspec":33.514,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":11.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234954.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234955","title":"Add UDM SCAS test case for checking the authentication verification of a synchronization failure message","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49550,"status":"not pursued","reservation_date":"2023-10-30 13:44:05","uploaded":"2023-10-30 13:49:09","revisionof":"S3-234929","revisedto":"","release":"Rel-19","crspec":33.514,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":12.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234955.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234956","title":"Add UDM threat reference for missing verification of synchronization failure messages.","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 10\/30\/2023. Original source : BSI (DE)","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49560,"status":"not pursued","reservation_date":"2023-10-30 13:44:46","uploaded":"2023-10-30 13:49:15","revisionof":"S3-234930","revisedto":"","release":"Rel-19","crspec":33.926,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":81.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234956.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234982","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44131,"status":"agreed","reservation_date":"2023-06-11 10:22:16","uploaded":"2023-11-06 10:22:16","revisionof":"S3-234413","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":52.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-231338","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234982.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234983","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44141,"status":"agreed","reservation_date":"2023-06-11 10:22:16","uploaded":"2023-11-06 10:22:16","revisionof":"S3-234414","revisedto":"","release":"Rel-17","crspec":33.511,"crspecversion":"17.4.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":53.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-231338","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234983.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234984","title":"To replace RRC connection reconfiguration by RRC reconfiguration","source":"ISSDU","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44151,"status":"agreed","reservation_date":"2023-06-11 10:22:16","uploaded":"2023-11-06 10:22:16","revisionof":"S3-234415","revisedto":"","release":"Rel-16","crspec":33.511,"crspecversion":"16.10.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":54.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231338","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-234984.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235043","title":"Added UDM SCAS test cases for checking an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":49541,"status":"agreed","reservation_date":"2023-08-11 16:55:28","uploaded":"2023-11-08 16:55:28","revisionof":"S3-234954","revisedto":"","release":"Rel-18","crspec":33.514,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":11.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235043.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235049","title":"Inconsistent use of terms","source":"Nokia, Nokia Shanghai Bell, Deutsche Telekom, T-mobile, ZTE, Ericsson, BSI, Huawei, TELUS, MITRE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44361,"status":"agreed","reservation_date":"2023-10-11 11:16:17","uploaded":"2023-11-10 11:16:17","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":133.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235049.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235050","title":"Disclaimer for Indirect Communication","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44391,"status":"agreed","reservation_date":"2023-10-11 11:16:17","uploaded":"2023-11-10 11:16:17","revisionof":"S3-234439","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":132.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235050.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-235108","title":"Clarification on SCAS Definitions and abbreviations","source":"T-Mobile USA Inc.T-Mobile US, Deutsche Telekom, ZTE Corporation, BSI, Nokia, Ericson, Huawei, Telus, MITRE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":4,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":44121,"status":"agreed","reservation_date":"2023-10-11 14:25:21","uploaded":"2023-11-10 14:25:21","revisionof":"S3-234412","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":129.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-231339","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_113_Chicago\/Docs\/S3-235108.zip","group":"S3","meeting":"S3-113","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]