First published: Thu Sep 26 2024(Updated: )
In the goTenna Pro ATAK Plugin there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing goTenna mesh networks. This vulnerability can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised. It is advised to use encryption shared with local QR code for higher security operations.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna | <2.0.7 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * ATAK Plugin: v2.0.7 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41722 has a high severity rating due to its potential for message injection within goTenna mesh networks.
CVE-2024-41722 can be exploited through the use of a software defined radio to inject custom messages into unencrypted goTenna mesh networks.
CVE-2024-41722 affects all versions of goTenna up to 2.0.7.
Mitigating CVE-2024-41722 involves ensuring that goTenna devices are configured to use encryption and applying any available software updates.
Organizations using the goTenna Pro ATAK Plugin in unencrypted environments are at risk from CVE-2024-41722.