We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-45374

goTenna Pro ATAK Plugin Weak Password Requirements



Assignericscert
Reserved2024-09-24
Published2024-09-26
Updated2024-10-17

Description

The goTenna Pro ATAK plugin uses a weak password for sharing encryption keys via the key broadcast method. If the broadcasted encryption key is captured over RF, and password is cracked via brute force attack, it is possible to decrypt it and use it to decrypt all future and past messages sent via encrypted broadcast with that particular key. This only applies when the key is broadcasted over RF. This is an optional feature, so it is advised to use local QR encryption key sharing for additional security on this and previous versions.



MEDIUM: 5.3CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
MEDIUM: 6.0CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Product status

Default status
unaffected

Any version
affected

Credits

Erwin Karincic, Clayton Smith, and Dale Wooden reported this these vulnerabilities to CISA. finder

References

https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 government-resource

cve.org CVE-2024-45374

nvd.nist.gov CVE-2024-45374

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.