In the goTenna Pro ATAK Plugin there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing goTenna mesh networks. This vulnerability can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. It is advised to use encryption shared with local QR code for higher security operations.
History

Thu, 17 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Description In the goTenna Pro ATAK Plugin there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing gotenna mesh networks. This vulnerability can be exploited if the device is being used in a unencrypted environment or if the cryptography has already been compromised. In the goTenna Pro ATAK Plugin there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing goTenna mesh networks. This vulnerability can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. It is advised to use encryption shared with local QR code for higher security operations.

Mon, 07 Oct 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Gotenna
Gotenna gotenna
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:gotenna:gotenna:*:*:*:*:*:atak:*:*
Vendors & Products Gotenna
Gotenna gotenna

Thu, 26 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 18:00:00 +0000

Type Values Removed Values Added
Description In the goTenna Pro ATAK Plugin there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing gotenna mesh networks. This vulnerability can be exploited if the device is being used in a unencrypted environment or if the cryptography has already been compromised.
Title goTenna Pro ATAK Plugin Weak Authentication
Weaknesses CWE-1390
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2024-09-26T17:39:46.735Z

Updated: 2024-10-17T16:59:45.950Z

Reserved: 2024-09-24T14:22:20.129Z

Link: CVE-2024-41722

cve-icon Vulnrichment

Updated: 2024-09-26T18:31:32.868Z

cve-icon NVD

Status : Modified

Published: 2024-09-26T18:15:06.193

Modified: 2024-10-17T17:15:11.667

Link: CVE-2024-41722

cve-icon Redhat

No data.