The goTenna Pro App uses AES CTR type encryption for short, encrypted
messages without any additional integrity checking mechanisms. This
leaves messages malleable to an attacker that can access the message. It
is recommended to continue to use encryption in the app and update to
the current release for more secure operations.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
17 Oct 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The goTenna Pro App uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is recommended to continue to use encryption in the app and update to the current release for more secure operations. |
07 Oct 2024, 18:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:iphone_os:*:* cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:android:*:* |
07 Oct 2024, 16:46
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gotenna
Gotenna gotenna Pro |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.1 |
CWE | CWE-345 | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04 - Third Party Advisory, US Government Resource | |
CPE | cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:*:*:* |
30 Sep 2024, 12:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Sep 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 0.0 |
26 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-26 18:15
Updated : 2024-10-17 18:15
NVD link : CVE-2024-47123
Mitre link : CVE-2024-47123
CVE.ORG link : CVE-2024-47123
JSON object : View
Products Affected
gotenna
- gotenna_pro