First published: Thu Sep 26 2024(Updated: )
The goTenna Pro ATAK Plugin encryption key name is always sent unencrypted when the key is sent over RF through a broadcast message. It is advised to share the encryption key via local QR for higher security operations.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna | <2.0.7 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * ATAK Plugin: v2.0.7 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41931 is rated as a medium severity vulnerability due to the exposure of sensitive information.
CVE-2024-41931 affects security by transmitting encryption key names unencrypted over RF, which could be intercepted.
To fix CVE-2024-41931, it is advised to share the encryption key using local QR codes instead of broadcast messages.
CVE-2024-41931 affects goTenna versions up to and including 2.0.7.
Users of goTenna should ensure they use QR code sharing for encryption keys to mitigate the risks outlined in CVE-2024-41931.