Encryption Keys Stored on Device Vulnerability
CVE-2024-45374

6MEDIUM

Key Information:

Vendor

Gotenna

Vendor
CVE Published:
26 September 2024

What is CVE-2024-45374?

The goTenna Pro ATAK plugin uses a weak password for sharing encryption keys via the key broadcast method. If the broadcasted encryption key is captured over RF, and password is cracked via brute force attack, it is possible to decrypt it and use it to decrypt all future and past messages sent via encrypted broadcast with that particular key. This only applies when the key is broadcasted over RF. This is an optional feature, so it is advised to use local QR encryption key sharing for additional security on this and previous versions.

Affected Version(s)

Pro ATAK Plugin 0 <= 1.9.12

References

CVSS V4

Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erwin Karincic, Clayton Smith, and Dale Wooden reported this these vulnerabilities to CISA.
.