The goTenna Pro ATAK Plugin does not use SecureRandom when generating
passwords for sharing cryptographic keys. The random function in use
makes it easier for attackers to brute force this password if the
broadcasted encryption key is captured over RF. This only applies to the
optional broadcast of an encryption key, so it is advised to share the
key with local QR code for higher security operations.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 | Third Party Advisory US Government Resource |
Configurations
History
17 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The goTenna Pro ATAK Plugin does not use SecureRandom when generating passwords for sharing cryptographic keys. The random function in use makes it easier for attackers to brute force this password if the broadcasted encryption key is captured over RF. This only applies to the optional broadcast of an encryption key, so it is advised to share the key with local QR code for higher security operations. |
07 Oct 2024, 17:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gotenna
Gotenna gotenna |
|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 - Third Party Advisory, US Government Resource | |
CPE | cpe:2.3:a:gotenna:gotenna:*:*:*:*:*:atak:*:* |
30 Sep 2024, 12:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 18:15
Updated : 2024-10-17 17:15
NVD link : CVE-2024-45723
Mitre link : CVE-2024-45723
CVE.ORG link : CVE-2024-45723
JSON object : View
Products Affected
gotenna
- gotenna
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)