CVE-2024-47123
Oct. 17, 2024, 6:15 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
gotenna |
|
|
Description
The goTenna Pro App uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is recommended to continue to use encryption in the app and update to the current release for more secure operations.
Weaknesses
CWE-345
Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
CWE ID: 345CWE-353
Missing Support for Integrity Check
The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.
CWE ID: 353Date
Published: Sept. 26, 2024, 6:15 p.m.
Last Modified: Oct. 17, 2024, 6:15 p.m.
Status : Modified
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
ics-cert@hq.dhs.gov
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | gotenna | gotenna_pro | / | / | / | / | / | iphone_os | / | / |
a | gotenna | gotenna_pro | / | / | / | / | / | android | / | / |
CVSS Data
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
Base Score
Exploitability Score
Impact Score
Base Severity
LOWCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N