CVE-2024-47123

The goTenna Pro App uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is recommended to continue to use encryption in the app and update to the current release for more secure operations.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:android:*:*

History

No history.

Information

Published : 2024-09-26 18:15

Updated : 2024-11-21 17:15


NVD link : CVE-2024-47123

Mitre link : CVE-2024-47123

CVE.ORG link : CVE-2024-47123


JSON object : View

Products Affected

gotenna

  • gotenna_pro
CWE
CWE-353

Missing Support for Integrity Check

CWE-345

Insufficient Verification of Data Authenticity