First published: Thu Sep 26 2024(Updated: )
The goTenna Pro ATAK Plugin uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is advised to continue to use encryption in the plugin and update to the current release for enhanced encryption protocols.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna | <2.0.7 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * ATAK Plugin: v2.0.7 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43108 is classified as a medium severity vulnerability due to the potential for message manipulation.
To mitigate CVE-2024-43108, ensure that you are using the latest version of the goTenna Pro ATAK Plugin and consider adding additional integrity checks for message verification.
CVE-2024-43108 is caused by the use of AES CTR type encryption without appropriate integrity checking mechanisms in the goTenna Pro ATAK Plugin.
CVE-2024-43108 affects users of the goTenna Pro ATAK Plugin versions prior to 2.0.7.
CVE-2024-43108 can be exploited by attackers who can intercept and manipulate encrypted messages sent via the goTenna Pro ATAK Plugin.