In the goTenna Pro App, the encryption keys are stored along with a
static IV on the End User Device (EUD). This allows for complete
decryption of keys stored on the EUD if physically compromised. This
allows an attacker to decrypt all encrypted broadcast communications
based on encryption keys stored on the EUD. This requires access to and
control of the EUD, so it is recommended to use strong access control
measures and layered encryption on the EUD for more secure operation.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-09-26 18:15
Updated : 2024-10-17 18:15
NVD link : CVE-2024-47122
Mitre link : CVE-2024-47122
CVE.ORG link : CVE-2024-47122
JSON object : View
Products Affected
gotenna
- gotenna_pro
CWE
CWE-922
Insecure Storage of Sensitive Information