In the goTenna Pro ATAK Plugin there is a vulnerability that makes it
possible to inject any custom message with any GID and Callsign using a
software defined radio in existing goTenna mesh networks. This
vulnerability can be exploited if the device is being used in an
unencrypted environment or if the cryptography has already been
compromised. It is advised to use encryption shared with local QR code
for higher security operations.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 | Third Party Advisory US Government Resource |
Configurations
History
17 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) In the goTenna Pro ATAK Plugin there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing goTenna mesh networks. This vulnerability can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. It is advised to use encryption shared with local QR code for higher security operations. |
07 Oct 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gotenna:gotenna:*:*:*:*:*:atak:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Gotenna
Gotenna gotenna |
|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 - Third Party Advisory, US Government Resource |
30 Sep 2024, 12:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 18:15
Updated : 2024-10-17 17:15
NVD link : CVE-2024-41722
Mitre link : CVE-2024-41722
CVE.ORG link : CVE-2024-41722
JSON object : View
Products Affected
gotenna
- gotenna
CWE