CVE-2024-43108

The goTenna Pro ATAK Plugin uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is advised to continue to use encryption in the plugin and update to the current release for enhanced encryption protocols.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:gotenna:gotenna:*:*:*:*:*:atak:*:*

History

17 Oct 2024, 17:15

Type Values Removed Values Added
Summary (en) The goTenna Pro ATAK Plugin use AES CTR mode for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to any attacker that can access the message. (en) The goTenna Pro ATAK Plugin uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is advised to continue to use encryption in the plugin and update to the current release for enhanced encryption protocols.

07 Oct 2024, 19:45

Type Values Removed Values Added
CPE cpe:2.3:a:gotenna:gotenna:*:*:*:*:*:atak:*:*
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 6.5
CWE CWE-345
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 - Third Party Advisory, US Government Resource
First Time Gotenna
Gotenna gotenna

30 Sep 2024, 12:46

Type Values Removed Values Added
Summary
  • (es) El complemento ATAK de goTenna Pro utiliza el modo AES CTR para mensajes breves y cifrados sin ningún mecanismo de comprobación de integridad adicional. Esto permite que los mensajes sean manipulables para cualquier atacante que pueda acceder a ellos.

26 Sep 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-26 18:15

Updated : 2024-10-17 17:15


NVD link : CVE-2024-43108

Mitre link : CVE-2024-43108

CVE.ORG link : CVE-2024-43108


JSON object : View

Products Affected

gotenna

  • gotenna
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-353

Missing Support for Integrity Check