The KSA (Known Silence Attack) can be rendered moot by implementing rolling keys, but ask me if or how rolling keys are implemented in a P25 environment and I'll just tell you that I don't know anything about that. Because it's the truth. I don't know.
I do know that AES is a deterministic algorithm. For a specific input, and a specific key, the output will always be the same. If the input word was, for example, "7311" in hex, with a specific key, call it key ABC123 and that caused the output to be "1234" in hex, then every time the input word is 7311 the output is 1234. As long as key ABC123 is being used.
And, there are only a limited number of sound "symbols" in the IMBE/AMBE codecs. It provides a limited range of word values, rather than all possible world values. This limits the possible number of input symbols. This implies a reduced workload required to mathematically crack the encryption, except that you still have to deal with the rolling code if implemented.
However, the weakness is not in AES itself, but in the handling of the keys. Key security is a limiting factor in system security.