Insecure Messaging: goTenna Pro Series Flawed with AES CTR Mode Only
CVE-2024-47123

3.1LOW

Key Information:

Vendor

Gotenna

Status
Vendor
CVE Published:
26 September 2024

What is CVE-2024-47123?

The goTenna Pro App uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is recommended to continue to use encryption in the app and update to the current release for more secure operations.

Affected Version(s)

Pro 0 <= 1.61

References

CVSS V3.1

Score:
3.1
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erwin Karincic, Clayton Smith, and Dale Wooden reported this these vulnerabilities to CISA.
.