First published: Thu Sep 26 2024(Updated: )
In the goTenna Pro ATAK Plugin application, the encryption keys are stored along with a static IV on the device. This allows for complete decryption of keys stored on the device. This allows an attacker to decrypt all encrypted broadcast communications based on broadcast keys stored on the device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna ATAK Plugin | <2.0.7 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * ATAK Plugin: v2.0.7 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43694 is considered a critical vulnerability due to the potential for complete decryption of sensitive communication keys.
To mitigate CVE-2024-43694, upgrade the goTenna Pro ATAK Plugin to version 2.0.7 or later, where this vulnerability is addressed.
CVE-2024-43694 affects the goTenna Pro ATAK Plugin application versions prior to 2.0.7.
An attacker could exploit CVE-2024-43694 to decrypt all encrypted broadcast communications by accessing the stored encryption keys.
CVE-2024-43694 is specific to devices running the goTenna Pro ATAK Plugin prior to version 2.0.7.