[{"name":"S3-233538","title":"Interface Robustness","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35380,"status":"agreed","reservation_date":"2023-07-17 11:52:20","uploaded":"2023-08-07 08:16:54","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.117,"crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":121.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230888","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233538.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.6.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233539","title":"Security Event Logging","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35390,"status":"agreed","reservation_date":"2023-07-17 11:54:20","uploaded":"2023-08-07 08:16:54","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.117,"crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":122.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230888","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233539.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.6.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233540","title":"Privileged Users","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35400,"status":"agreed","reservation_date":"2023-07-17 11:56:05","uploaded":"2023-08-07 08:16:54","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.117,"crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":123.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230888","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233540.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233541","title":"AMF redirection to EPS remove CIoT precondition","source":"Keysight Technologies","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 7\/18\/2023. Original source : Keysight Technologies UK Ltd","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35410,"status":"revised","reservation_date":"2023-07-18 08:02:44","uploaded":"2023-07-18 08:54:37","revisionof":"","revisedto":"S3-234326","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":38.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233541.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.2.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233542","title":"NAS based redirection from 5GS to EPS","source":"Keysight Technologies","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 7\/18\/2023. Original source : Keysight Technologies UK Ltd","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35420,"status":"not pursued","reservation_date":"2023-07-18 08:04:25","uploaded":"2023-07-18 08:54:37","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":75.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233542.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"K.2.8","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233543","title":"AMF Test - NAS Integrity failure","source":"Keysight Technologies","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 7\/18\/2023. Original source : Keysight Technologies UK Ltd","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35430,"status":"agreed","reservation_date":"2023-07-18 08:05:54","uploaded":"2023-07-18 08:54:37","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":39.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233543.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"New clause 4.2.2.1.X","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233546","title":"Packet Filtering support Testing","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35460,"status":"not pursued","reservation_date":"2023-07-26 08:52:10","uploaded":"2023-08-07 08:16:54","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.117,"crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":124.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233546.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.6.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233603","title":"Added UDM threat reference for use of an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36030,"status":"revised","reservation_date":"2023-04-08 09:02:01","uploaded":"2023-08-04 13:06:36","revisionof":"","revisedto":"S3-233622","release":"Rel-18","crspec":33.926,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":76.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233603.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233604","title":"Added UDM SCAS test cases for checking an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36040,"status":"revised","reservation_date":"2023-04-08 09:03:44","uploaded":"2023-08-04 13:27:13","revisionof":"","revisedto":"S3-233623","release":"Rel-18","crspec":33.514,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":8.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233604.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233605","title":"Clarification of Replay Protection of NAS signalling messages","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36050,"status":"revised","reservation_date":"2023-04-08 09:05:15","uploaded":"2023-08-04 13:35:57","revisionof":"","revisedto":"S3-234165","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":40.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233605.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233606","title":"Clarification of NAS integrity algorithm selection and use","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36060,"status":"revised","reservation_date":"2023-04-08 09:06:59","uploaded":"2023-08-04 13:35:57","revisionof":"","revisedto":"S3-234166","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":41.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233606.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233607","title":"Clarification of invalid or unacceptable UE security capabilities handling","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36070,"status":"revised","reservation_date":"2023-04-08 09:09:08","uploaded":"2023-08-04 13:35:57","revisionof":"","revisedto":"S3-234167","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":42.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233607.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.6.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233609","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36090,"status":"agreed","reservation_date":"2023-04-08 10:17:43","uploaded":"2023-08-04 13:35:57","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.514,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":9.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233609.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.1.1; 4.2.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233610","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36100,"status":"agreed","reservation_date":"2023-04-08 10:18:37","uploaded":"2023-08-04 13:35:57","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":77.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233610.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"E.2.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233611","title":"Correction of UDM service naming","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36110,"status":"revised","reservation_date":"2023-04-08 10:20:28","uploaded":"2023-08-04 13:35:57","revisionof":"","revisedto":"S3-234191","release":"Rel-18","crspec":33.501,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":1686.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233611.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"3.1, ","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233622","title":"Added UDM threat reference for use of an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36220,"status":"revised","reservation_date":"2023-04-08 13:09:33","uploaded":"2023-08-04 13:11:18","revisionof":"S3-233603","revisedto":"S3-233624","release":"Rel-18","crspec":33.926,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":76.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233622.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233623","title":"Added UDM SCAS test cases for checking an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE), Deutsche Telekom AG","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36230,"status":"not pursued","reservation_date":"2023-04-08 13:28:44","uploaded":"2023-08-04 13:31:36","revisionof":"S3-233604","revisedto":"","release":"Rel-18","crspec":33.514,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":8.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233623.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233624","title":"Added UDM threat reference for use of an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36240,"status":"revised","reservation_date":"2023-04-08 13:32:13","uploaded":"2023-08-04 13:35:57","revisionof":"S3-233622","revisedto":"S3-233625","release":"Rel-18","crspec":33.926,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":76.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233624.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233625","title":"Added UDM threat reference for use of an invalid and uncompressed point in ECIES protection scheme for SUCI decryption","source":"BSI (DE), Deutsche Telekom AG","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 8\/4\/2023. Original source : BSI (DE)","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36250,"status":"not pursued","reservation_date":"2023-04-08 13:37:17","uploaded":"2023-08-04 13:38:02","revisionof":"S3-233624","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":76.0,"crrevision":3.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233625.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233773","title":"Addition of critical assets and threats specific to NSSAAF network product class","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 8\/7\/2023. Original title : Correction and completion of NSSAAF annex<br\/><br\/>Source modified on 8\/7\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":37730,"status":"agreed","reservation_date":"2023-07-08 06:21:06","uploaded":"2023-08-07 12:36:15","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.926,"crspecversion":"17.7.0","workitem":[{"winame":"SCAS_5G_NSSAAF"}],"crnumber":78.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230903","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233773.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2, Annex P","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233774","title":"Addition of critical assets and threats specific to NSSAAF network product class","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 8\/7\/2023. Original title : Correction and completion of NSSAAF annex (Rel-18 mirror)<br\/><br\/>Source modified on 8\/7\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":37740,"status":"agreed","reservation_date":"2023-07-08 06:21:07","uploaded":"2023-08-07 12:36:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_NSSAAF"}],"crnumber":79.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-230903","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233774.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2, Annex P","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233775","title":"Reference correction for MnF SCAS","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":37750,"status":"agreed","reservation_date":"2023-07-08 06:21:07","uploaded":"2023-08-07 12:36:15","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.526,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_MF"}],"crnumber":1.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230902","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233775.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233858","title":"Adding the missing Xn-U interface","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":38580,"status":"revised","reservation_date":"2023-07-08 08:34:39","uploaded":"2023-08-07 14:09:02","revisionof":"","revisedto":"S3-234327","release":"Rel-18","crspec":33.511,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":46.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233858.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"4.4.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233859","title":"Correction of cross-refence in clause 4.2.3.4.1","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":38590,"status":"not pursued","reservation_date":"2023-07-08 08:34:39","uploaded":"2023-08-07 14:09:02","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.511,"crspecversion":"16.10.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":47.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233859.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"4.2.3.4.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233860","title":"Correction of cross-refence in clause 4.2.3.4.1","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":38600,"status":"not pursued","reservation_date":"2023-07-08 08:34:40","uploaded":"2023-08-07 14:09:02","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.511,"crspecversion":"17.4.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":48.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233860.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"4.2.3.4.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233861","title":"Correction of cross-refence in clause 4.2.3.4.1","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":38610,"status":"revised","reservation_date":"2023-07-08 08:34:41","uploaded":"2023-08-07 14:09:02","revisionof":"","revisedto":"S3-234226","release":"Rel-18","crspec":33.511,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":49.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233861.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"4.2.3.4.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-233862","title":"Adding a missing requirement name","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 8\/7\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":38620,"status":"agreed","reservation_date":"2023-07-08 08:34:42","uploaded":"2023-08-07 14:09:02","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS"},{"winame":" TEI18"}],"crnumber":125.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-233862.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":false,"clauses_affected":"4.2.3.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234165","title":"Clarification of Replay Protection of NAS signalling messages","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36051,"status":"agreed","reservation_date":"2023-08-16 17:37:22","uploaded":"2023-08-16 17:37:22","revisionof":"S3-233605","revisedto":"","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":40.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234165.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234166","title":"Clarification of NAS integrity algorithm selection and use","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36061,"status":"agreed","reservation_date":"2023-08-16 17:37:22","uploaded":"2023-08-16 17:37:22","revisionof":"S3-233606","revisedto":"","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":41.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234166.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234167","title":"Clarification of invalid or unacceptable UE security capabilities handling","source":"BSI (DE)","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":36071,"status":"agreed","reservation_date":"2023-08-16 17:37:22","uploaded":"2023-08-16 17:37:22","revisionof":"S3-233607","revisedto":"","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":42.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234167.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234220","title":"Rel-18 Interface Robustness","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35381,"status":"agreed","reservation_date":"2023-08-17 16:21:03","uploaded":"2023-08-17 16:21:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.0.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":126.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-230888","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234220.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234221","title":"rel-18 Privileged Users","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35401,"status":"agreed","reservation_date":"2023-08-17 16:21:03","uploaded":"2023-08-17 16:21:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.0.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":127.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-230888","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234221.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234226","title":"Correction of cross-refence in clause 4.2.3.4.1","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":38611,"status":"agreed","reservation_date":"2023-08-18 08:00:27","uploaded":"2023-08-18 08:00:27","revisionof":"S3-233861","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":49.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234226.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234326","title":"AMF redirection to EPS remove CIoT precondition","source":"Keysight Technologies","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":35411,"status":"agreed","reservation_date":"2023-08-17 16:21:03","uploaded":"2023-08-17 16:21:03","revisionof":"S3-233541","revisedto":"","release":"Rel-18","crspec":33.512,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":38.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234326.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-234327","title":"Adding the missing Xn-U interface","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":7,"ainumber":"4.9.1","ainame":"Security Assurance","tdoc_agenda_sort_order":38581,"status":"agreed","reservation_date":"2023-08-17 16:21:03","uploaded":"2023-08-17 16:21:03","revisionof":"S3-233858","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":46.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230904","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_112_Goteborg\/Docs\/S3-234327.zip","group":"S3","meeting":"S3-112","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]