CVE-2024-45723

The goTenna Pro ATAK Plugin does not use SecureRandom when generating passwords for sharing cryptographic keys. The random function in use makes it easier for attackers to brute force this password if the broadcasted encryption key is captured over RF. This only applies to the optional broadcast of an encryption key, so it is advised to share the key with local QR code for higher security operations.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:gotenna:gotenna:*:*:*:*:*:atak:*:*

History

No history.

Information

Published : 2024-09-26 18:15

Updated : 2024-10-17 17:15


NVD link : CVE-2024-45723

Mitre link : CVE-2024-45723

CVE.ORG link : CVE-2024-45723


JSON object : View

Products Affected

gotenna

  • gotenna
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)