Payload Length Vulnerability Affects goTenna Pro ATAK Plugin
CVE-2024-41715
4.3MEDIUM
What is CVE-2024-41715?
The goTenna Pro ATAK Plugin is vulnerable due to the lack of obfuscation techniques in its broadcasted frames. Specifically, the plugin does not inject extra characters into messages, allowing malicious actors to infer the actual length of the payloads. This vulnerability compromises the expected confidentiality provided by encryption, as attackers can determine the size of the transmitted data regardless of how securely it is encrypted. Proper measures should be implemented to enhance message obfuscation and safeguard sensitive information.
Affected Version(s)
Pro ATAK Plugin 0 <= 1.9.12
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Erwin Karincic, Clayton Smith, and Dale Wooden reported this these vulnerabilities to CISA.