CVE-2024-43814
- EPSS 0.07%
- Veröffentlicht 26.09.2024 18:15:07
- Zuletzt bearbeitet 17.10.2024 18:15:04
The goTenna Pro ATAK Plugin's default settings are to share Automatic Position, Location, and Information (PLI) updates every 60 seconds once the plugin is active and goTenna is connected. Users that are unaware of their settings and have not acti...
CVE-2024-45374
- EPSS 0.14%
- Veröffentlicht 26.09.2024 18:15:07
- Zuletzt bearbeitet 17.10.2024 17:15:11
The goTenna Pro ATAK plugin uses a weak password for sharing encryption keys via the key broadcast method. If the broadcasted encryption key is captured over RF, and password is cracked via brute force attack, it is possible to decrypt it and use ...
CVE-2024-45723
- EPSS 0.08%
- Veröffentlicht 26.09.2024 18:15:07
- Zuletzt bearbeitet 17.10.2024 17:15:12
The goTenna Pro ATAK Plugin does not use SecureRandom when generating passwords for sharing cryptographic keys. The random function in use makes it easier for attackers to brute force this password if the broadcasted encryption key is captured ove...
CVE-2024-41722
- EPSS 0.05%
- Veröffentlicht 26.09.2024 18:15:06
- Zuletzt bearbeitet 17.10.2024 17:15:11
In the goTenna Pro ATAK Plugin there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing goTenna mesh networks. This vulnerability can be exploited if the devi...
CVE-2024-41931
- EPSS 0.06%
- Veröffentlicht 26.09.2024 18:15:06
- Zuletzt bearbeitet 17.10.2024 17:15:11
The goTenna Pro ATAK Plugin encryption key name is always sent unencrypted when the key is sent over RF through a broadcast message. It is advised to share the encryption key via local QR for higher security operations.
CVE-2024-43108
- EPSS 0.04%
- Veröffentlicht 26.09.2024 18:15:06
- Zuletzt bearbeitet 17.10.2024 17:15:11
The goTenna Pro ATAK Plugin uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is advised to continue to us...