[{"name":"S3-232409","title":"New SCAS test on trust anchoring","source":"BSI (DE)","contact":"Andreas Pashalidis","contact-id":97357,"tdoctype":"CR","for":"Approval","abstract":"New SCAS test on trust anchoring","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24090,"status":"revised","reservation_date":"2023-10-05 04:45:24","uploaded":"2023-05-10 04:49:49","revisionof":"","revisedto":"S3-232419","release":"Rel-17","crspec":"33.517","crspecversion":"17.0.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":10.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232409.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232410","title":"Interface Robustness","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24100,"status":"revised","reservation_date":"2023-10-05 06:05:56","uploaded":"2023-05-10 06:30:15","revisionof":"","revisedto":"S3-233193","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"SCAS"}],"crnumber":109.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232410.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232411","title":"Security Event Logging","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24110,"status":"revised","reservation_date":"2023-10-05 06:10:12","uploaded":"2023-05-10 06:30:15","revisionof":"","revisedto":"S3-233194","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"SCAS"}],"crnumber":110.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232411.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232412","title":"Privileged Users","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24120,"status":"revised","reservation_date":"2023-10-05 06:14:31","uploaded":"2023-05-10 06:30:15","revisionof":"","revisedto":"S3-233195","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"SCAS"}],"crnumber":111.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232412.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232419","title":"New SCAS test on trust anchoring","source":"Federal Office for Information Security (BSI)","contact":"Andreas Pashalidis","contact-id":97357,"tdoctype":"CR","for":"Approval","abstract":"New SCAS test on trust anchoring","secretary_remarks":"Source modified on 5\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24190,"status":"revised","reservation_date":"2023-10-05 14:52:32","uploaded":"2023-05-10 14:54:52","revisionof":"S3-232409","revisedto":"S3-233244","release":"Rel-18","crspec":"33.517","crspecversion":"17.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":10.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232419.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232452","title":"Clarification of synchronization failure handling","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24520,"status":"revised","reservation_date":"2023-12-05 13:30:52","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232476","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":25.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232452.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232454","title":"Clarification of RES* verification failure handling","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24540,"status":"revised","reservation_date":"2023-12-05 13:34:23","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-233130","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":26.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232454.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232456","title":"Clarification of Replay Protection of NAS signalling messages","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 5\/12\/2023. Original title :  Clarification of Replay Protection of NAS signalling messages<br\/><br\/>Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24560,"status":"revised","reservation_date":"2023-12-05 13:38:03","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-233134","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":27.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232456.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232458","title":"Clarification of NAS integrity algorithm selection and use","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24580,"status":"revised","reservation_date":"2023-12-05 13:40:20","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232504","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":28.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232458.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232459","title":"Clarification of invalid or unacceptable UE security capabilities handling","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24590,"status":"revised","reservation_date":"2023-12-05 13:41:52","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232477","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":29.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232459.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232461","title":"Clarification of NSSAA revocation","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24610,"status":"revised","reservation_date":"2023-12-05 13:43:23","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-233204","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":30.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232461.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.9.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232463","title":"Clarification of test applicability","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24630,"status":"revised","reservation_date":"2023-12-05 13:48:27","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232505","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":31.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232463.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232464","title":"Correction of Tester Instructions in Expected Results","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24640,"status":"revised","reservation_date":"2023-12-05 13:50:29","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232507","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":32.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232464.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232465","title":"Correction of format of evidence","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24650,"status":"revised","reservation_date":"2023-12-05 13:52:37","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232506","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":33.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232465.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232466","title":"Clarification of whether tester triggers an event or NF behaviour is observed in an Execution Step","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24660,"status":"revised","reservation_date":"2023-12-05 13:54:58","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-233345","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":34.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232466.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232467","title":"New SCAS test on valid UE security capability encoding while AS security establishment","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24670,"status":"revised","reservation_date":"2023-12-05 13:57:54","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-233205","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":35.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232467.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232468","title":"Threat reference for incorrectly encoded UE 5G security capabilities on the AMF NG interface","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24680,"status":"withdrawn","reservation_date":"2023-12-05 14:00:29","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":36.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232469","title":"Threat reference for incorrectly encoded UE 5G security capabilities on the AMF NG interface","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24690,"status":"revised","reservation_date":"2023-12-05 14:02:08","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-233206","release":"Rel-17","crspec":"33.926","crspecversion":"17.6.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":67.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232469.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232470","title":"Discussion on specification AMF SCAS test for incorrectly encoding security capabilities","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24700,"status":"noted","reservation_date":"2023-12-05 14:04:15","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":[{"winame":"eSCAS_5G"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232470.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232471","title":"Clarification of hashing","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24710,"status":"revised","reservation_date":"2023-12-05 14:05:53","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-233346","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":112.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232471.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232472","title":"Clarification of privilege escalation methods to check for","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24720,"status":"revised","reservation_date":"2023-12-05 14:07:28","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232474","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":113.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232472.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232473","title":"Clarification of privilege verification","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24730,"status":"revised","reservation_date":"2023-12-05 14:09:25","uploaded":"2023-05-12 14:16:33","revisionof":"","revisedto":"S3-232475","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":114.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232473.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232474","title":"Clarification of privilege escalation methods to check for","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24740,"status":"revised","reservation_date":"2023-12-05 14:22:34","uploaded":"2023-05-12 14:23:55","revisionof":"S3-232472","revisedto":"S3-233207","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":113.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232474.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.4.1.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232475","title":"Clarification of privilege verification","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/12\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24750,"status":"revised","reservation_date":"2023-12-05 14:24:40","uploaded":"2023-05-12 14:25:40","revisionof":"S3-232473","revisedto":"S3-233347","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":114.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232475.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.4.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232476","title":"Clarification of synchronization failure handling","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24760,"status":"revised","reservation_date":"2023-12-05 14:35:52","uploaded":"2023-05-12 14:37:13","revisionof":"S3-232452","revisedto":"S3-233208","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":25.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232476.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232477","title":"Clarification of invalid or unacceptable UE security capabilities handling","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24770,"status":"revised","reservation_date":"2023-12-05 14:42:25","uploaded":"2023-05-12 14:43:22","revisionof":"S3-232459","revisedto":"S3-232509","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":29.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232477.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232504","title":"Clarification of NAS integrity algorithm selection and use","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/14\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25040,"status":"revised","reservation_date":"2023-05-14 11:24:04","uploaded":"2023-05-14 11:25:28","revisionof":"S3-232458","revisedto":"S3-233135","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":28.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232504.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232505","title":"Clarification of test applicability","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/14\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25050,"status":"revised","reservation_date":"2023-05-14 11:26:07","uploaded":"2023-05-14 11:30:52","revisionof":"S3-232463","revisedto":"S3-233348","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":31.0,"crrevision":1.0,"crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232505.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.1.3, 4.2.2.8.1, 4.2.2.9.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232506","title":"Correction of format of evidence","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/14\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25060,"status":"revised","reservation_date":"2023-05-14 11:31:30","uploaded":"2023-05-14 11:33:50","revisionof":"S3-232465","revisedto":"S3-233333","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":33.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232506.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.1.1, 4.2.2.1.2, 4.2.2.1.3, 4.2.2.3.1, 4.2.2.3.2, 4.2.2.4.1, 4.2.2.4.2, 4.2.2.5.1, 4.2.2.6.1, 4.2.2.7, 4.2.2.8.1, 4.2.2.9.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232507","title":"Correction of Tester Instructions in Expected Results","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25070,"status":"revised","reservation_date":"2023-05-14 11:34:29","uploaded":"2023-05-14 11:36:46","revisionof":"S3-232464","revisedto":"S3-232508","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":32.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232507.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232508","title":"Correction of Tester Instructions in Expected Results","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/14\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25080,"status":"revised","reservation_date":"2023-05-14 11:38:17","uploaded":"2023-05-14 11:39:47","revisionof":"S3-232507","revisedto":"S3-233334","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":32.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232508.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.4.1, 4.2.2.4.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232509","title":"Clarification of invalid or unacceptable UE security capabilities handling","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/14\/2023. Original source : BSI (DE)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25090,"status":"revised","reservation_date":"2023-05-14 11:40:36","uploaded":"2023-05-14 11:42:01","revisionof":"S3-232477","revisedto":"S3-233133","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":29.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232509.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.6.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232530","title":"ME Change issue correction Solution 2","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25300,"status":"withdrawn","reservation_date":"2023-05-14 18:21:44","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.1.0","workitem":[{"winame":"TEI18"}],"crnumber":1610.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232544","title":"Correcting some references in TS 33.511","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25440,"status":"agreed","reservation_date":"2023-05-14 20:26:19","uploaded":"2023-05-15 12:38:49","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.511","crspecversion":"16.9.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":40.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230615","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232544.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"4.2.3.4.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232545","title":"Correcting some references in TS 33.511","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25450,"status":"revised","reservation_date":"2023-05-14 20:26:20","uploaded":"2023-05-15 12:38:49","revisionof":"","revisedto":"S3-233117","release":"Rel-17","crspec":"33.511","crspecversion":"17.3.1","workitem":[{"winame":"SCAS_5G"}],"crnumber":41.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232545.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232546","title":"Correcting some references in TS 33.926","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25460,"status":"revised","reservation_date":"2023-05-14 20:26:20","uploaded":"2023-05-15 12:38:49","revisionof":"","revisedto":"S3-233129","release":"Rel-16","crspec":"33.926","crspecversion":"16.7.0","workitem":[{"winame":"SCAS"},{"winame":" TEI16"}],"crnumber":68.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232546.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"A.1.2, C.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232547","title":"Correcting some references in TS 33.926","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25470,"status":"revised","reservation_date":"2023-05-14 20:26:21","uploaded":"2023-05-15 12:38:49","revisionof":"","revisedto":"S3-233118","release":"Rel-17","crspec":"33.926","crspecversion":"17.6.0","workitem":[{"winame":"SCAS"},{"winame":" TEI16"}],"crnumber":69.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232547.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232775","title":"Correction of annex for NSSAAF product class","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":27750,"status":"not pursued","reservation_date":"2023-05-15 07:33:36","uploaded":"2023-05-15 12:40:40","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.926","crspecversion":"17.6.0","workitem":[{"winame":"SCAS_5G_NSSAAF"}],"crnumber":72.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232775.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232806","title":"Security event logging of   username","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Username is not logged when there is incorrect login attempts to the network product.","secretary_remarks":"Title modified on 5\/15\/2023. Original title : Security event logging of username<br\/><br\/>Source modified on 5\/15\/2023. Original source : Ericsson","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28060,"status":"not pursued","reservation_date":"2023-05-15 07:55:50","uploaded":"2023-05-15 08:06:44","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.117","crspecversion":"16.10.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":116.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232806.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.6.1, 4.2.3.6.2, 4.2.3.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232809","title":"Security event logging of username","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Username is not logged when there is incorrect login attempts to the network product.","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Ericsson","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28090,"status":"not pursued","reservation_date":"2023-05-15 08:14:00","uploaded":"2023-05-15 08:25:12","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":117.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232809.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.6.1, 4.2.3.6.2, 4.2.3.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232821","title":"Password expiry","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Update password expiry requirements.","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Ericsson<br\/><br\/>Source modified on 15\/05\/2023. Original source : Ericsson","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28210,"status":"not pursued","reservation_date":"2023-05-15 08:33:44","uploaded":"2023-05-15 08:41:24","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.117","crspecversion":"16.10.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":118.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232821.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.4.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232822","title":"Introduction of user data protection over N3","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28220,"status":"not pursued","reservation_date":"2023-05-15 08:39:07","uploaded":"2023-05-15 08:48:25","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.511","crspecversion":"17.3.1","workitem":[{"winame":"SCAS_5G"}],"crnumber":43.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232822.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232823","title":"Password expiry","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Update password expiry requirements.","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Ericsson","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28230,"status":"not pursued","reservation_date":"2023-05-15 08:48:08","uploaded":"2023-05-15 08:55:16","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":119.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232823.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.4.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232843","title":"Correction of SBA test for UPF","source":"Huawei, Hisilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 5\/15\/2023. Original title : correction of SBA test for UPF-r16<br\/><br\/>Source modified on 5\/15\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28430,"status":"revised","reservation_date":"2023-05-15 09:10:06","uploaded":"2023-05-15 11:26:57","revisionof":"","revisedto":"S3-233335","release":"Rel-16","crspec":"33.513","crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":11.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232843.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.0","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-232844","title":"correction of SBA test for UPF-r17","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28440,"status":"revised","reservation_date":"2023-05-15 09:10:08","uploaded":"2023-05-15 11:26:57","revisionof":"","revisedto":"S3-233337","release":"Rel-17","crspec":"33.513","crspecversion":"17.1.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":12.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-232844.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233117","title":"Correcting some references in TS 33.511","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":31170,"status":"agreed","reservation_date":"2023-05-15 13:07:10","uploaded":"2023-05-15 13:45:24","revisionof":"S3-232545","revisedto":"","release":"Rel-17","crspec":"33.511","crspecversion":"17.3.1","workitem":[{"winame":"SCAS_5G"}],"crnumber":41.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230615","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233117.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"4.2.3.4.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233118","title":"Correcting some references in TS 33.926","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":31180,"status":"agreed","reservation_date":"2023-05-15 13:08:07","uploaded":"2023-05-15 13:45:24","revisionof":"S3-232547","revisedto":"","release":"Rel-17","crspec":"33.926","crspecversion":"17.6.0","workitem":[{"winame":"TEI16"}],"crnumber":69.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230597","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233118.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"A.1.2, C.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233129","title":"Correcting some references in TS 33.926","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":31290,"status":"agreed","reservation_date":"2023-05-15 13:34:28","uploaded":"2023-05-15 13:45:24","revisionof":"S3-232546","revisedto":"","release":"Rel-16","crspec":"33.926","crspecversion":"16.7.0","workitem":[{"winame":"TEI16"}],"crnumber":68.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230597","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233129.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"A.1.2, C.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233130","title":"Clarification of RES* verification failure handling","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Federal Office for Information Security (BSI)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":31300,"status":"revised","reservation_date":"2023-05-15 13:37:15","uploaded":"2023-05-15 13:44:14","revisionof":"S3-232454","revisedto":"S3-233338","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":26.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233130.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233133","title":"Clarification of invalid or unacceptable UE security capabilities handling","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":31330,"status":"not treated","reservation_date":"2023-05-15 14:21:30","uploaded":"2023-05-15 14:23:22","revisionof":"S3-232509","revisedto":"","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":29.0,"crrevision":3.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233133.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233134","title":"Clarification of Replay Protection of NAS signalling messages","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Federal Office for Information Security (BSI)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":31340,"status":"not treated","reservation_date":"2023-05-15 14:32:01","uploaded":"2023-05-15 14:33:58","revisionof":"S3-232456","revisedto":"","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":27.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233134.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233135","title":"Clarification of NAS integrity algorithm selection and use","source":"Federal Office for Information Security (BSI)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 5\/15\/2023. Original source : Federal Office for Information Security (BSI)","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":31350,"status":"not treated","reservation_date":"2023-05-15 14:38:26","uploaded":"2023-05-15 14:40:07","revisionof":"S3-232504","revisedto":"","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":28.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233135.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.2.2.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233193","title":"Interface Robustness","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24101,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232410","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":109.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230601","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233193.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233194","title":"Security Event Logging","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24111,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232411","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":110.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230601","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233194.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233195","title":"Privileged Users","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24121,"status":"agreed","reservation_date":"2023-05-26 13:32:43","uploaded":"2023-05-26 13:32:43","revisionof":"S3-232412","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":111.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230601","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233195.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233204","title":"Clarification of NSSAA revocation","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24611,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232461","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":30.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233204.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233205","title":"New SCAS test on valid UE security capability encoding while AS security establishment","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24671,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232467","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":35.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233205.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233206","title":"Threat reference for incorrectly encoded UE 5G security capabilities on the AMF NG interface","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24691,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232469","revisedto":"","release":"Rel-18","crspec":"33.926","crspecversion":"17.6.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":67.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-230677","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233206.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233207","title":"Clarification of privilege escalation methods to check for","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24741,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232474","revisedto":"","release":"Rel-18","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":113.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233207.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233208","title":"Clarification of synchronization failure handling","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24761,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232476","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":25.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233208.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233244","title":"New SCAS test on trust anchoring","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24191,"status":"agreed","reservation_date":"2023-05-25 17:29:20","uploaded":"2023-05-25 17:29:20","revisionof":"S3-232419","revisedto":"","release":"Rel-18","crspec":"33.517","crspecversion":"17.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":10.0,"crrevision":2.0,"crcategory":"B","tsg_crp":"SP-230677","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233244.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233333","title":"Correction of format of evidence","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25061,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232506","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":33.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233333.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233334","title":"Correction of Tester Instructions in Expected Results","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25081,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232508","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":32.0,"crrevision":3.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233334.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233335","title":"Correction of SBA test for UPF","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28431,"status":"agreed","reservation_date":"2023-05-26 13:32:43","uploaded":"2023-05-26 13:32:43","revisionof":"S3-232843","revisedto":"","release":"Rel-16","crspec":"33.513","crspecversion":"16.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":11.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230615","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233335.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233337","title":"correction of SBA test for UPF-r17","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":28441,"status":"agreed","reservation_date":"2023-05-26 13:32:43","uploaded":"2023-05-26 13:32:43","revisionof":"S3-232844","revisedto":"","release":"Rel-17","crspec":"33.513","crspecversion":"17.1.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":12.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230615","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233337.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233338","title":"Clarification of RES* verification failure handling","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":0,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-233130","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":26.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233338.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233345","title":"Clarification of whether tester triggers an event or NF behaviour is observed in an Execution Step","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24661,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232466","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":34.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233345.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233346","title":"Clarification of hashing","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24711,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232471","revisedto":"","release":"Rel-18","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":112.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233346.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233347","title":"Clarification of privilege verification","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":24751,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232475","revisedto":"","release":"Rel-18","crspec":"33.117","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":114.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233347.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233348","title":"Clarification of test applicability","source":"Federal Office for Information Security (BSI)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":25051,"status":"agreed","reservation_date":"2023-05-26 08:17:28","uploaded":"2023-05-26 08:17:28","revisionof":"S3-232505","revisedto":"","release":"Rel-18","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":31.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230604","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_111_Berlin\/Docs\/S3-233348.zip","group":"S3","meeting":"S3-111","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]