In the goTenna Pro ATAK Plugin there is a vulnerability that makes it
possible to inject any custom message with any GID and Callsign using a
software defined radio in existing goTenna mesh networks. This
vulnerability can be exploited if the device is being used in an
unencrypted environment or if the cryptography has already been
compromised. It is advised to use encryption shared with local QR code
for higher security operations.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2024-09-26 18:15
Updated : 2024-10-17 17:15
NVD link : CVE-2024-41722
Mitre link : CVE-2024-41722
CVE.ORG link : CVE-2024-41722
JSON object : View
Products Affected
gotenna
- gotenna
CWE