First published: Thu Sep 26 2024(Updated: )
The goTenna Pro ATAK Plugin does not inject extra characters into broadcasted frames to obfuscate the length of messages. This makes it possible to tell the length of the payload regardless of the encryption used.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna ATAK Plugin | <2.0.7 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * ATAK Plugin: v2.0.7 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41715 is classified as a medium severity vulnerability due to its potential impact on the confidentiality of transmitted data.
To fix CVE-2024-41715, update the goTenna Pro ATAK Plugin to version 2.0.7 or later.
CVE-2024-41715 exploits the lack of message length obfuscation in the goTenna Pro ATAK Plugin.
CVE-2024-41715 affects users of the goTenna Pro ATAK Plugin versions prior to 2.0.7.
The potential consequences of CVE-2024-41715 include the exposure of message payload lengths, which could lead to information leakage.