Payload Length Vulnerability Affects goTenna Pro ATAK Plugin
CVE-2024-41715

4.3MEDIUM

Key Information:

Vendor

Gotenna

Vendor
CVE Published:
26 September 2024

What is CVE-2024-41715?

The goTenna Pro ATAK Plugin is vulnerable due to the lack of obfuscation techniques in its broadcasted frames. Specifically, the plugin does not inject extra characters into messages, allowing malicious actors to infer the actual length of the payloads. This vulnerability compromises the expected confidentiality provided by encryption, as attackers can determine the size of the transmitted data regardless of how securely it is encrypted. Proper measures should be implemented to enhance message obfuscation and safeguard sensitive information.

Affected Version(s)

Pro ATAK Plugin 0 <= 1.9.12

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erwin Karincic, Clayton Smith, and Dale Wooden reported this these vulnerabilities to CISA.
.