In the goTenna Pro ATAK Plugin application, the encryption keys are
stored along with a static IV on the device. This allows for complete
decryption of keys stored on the device. This allows an attacker to
decrypt all encrypted broadcast communications based on broadcast keys
stored on the device.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gotenna atak Plugin
|
|
CPEs | cpe:2.3:a:gotenna:atak_plugin:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gotenna atak Plugin
|
Thu, 26 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gotenna
Gotenna pro Atak Plugin |
|
CPEs | cpe:2.3:a:gotenna:pro_atak_plugin:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gotenna
Gotenna pro Atak Plugin |
|
Metrics |
ssvc
|
Thu, 26 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the goTenna Pro ATAK Plugin application, the encryption keys are stored along with a static IV on the device. This allows for complete decryption of keys stored on the device. This allows an attacker to decrypt all encrypted broadcast communications based on broadcast keys stored on the device. | |
Title | goTenna Pro ATAK Plugin Insecure Storage of Sensitive Information | |
Weaknesses | CWE-922 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2024-09-26T17:25:52.840Z
Updated: 2024-09-26T18:26:54.248Z
Reserved: 2024-09-24T14:22:20.080Z
Link: CVE-2024-43694
Vulnrichment
Updated: 2024-09-26T18:26:47.919Z
NVD
Status : Analyzed
Published: 2024-09-26T18:15:06.960
Modified: 2024-10-07T19:40:04.147
Link: CVE-2024-43694
Redhat
No data.