First published: Thu Sep 26 2024(Updated: )
The goTenna Pro ATAK plugin uses a weak password for sharing encryption keys via the key broadcast method. If the broadcasted encryption key is captured over RF, and password is cracked via brute force attack, it is possible to decrypt it and use it to decrypt all future and past messages sent via encrypted broadcast with that particular key. This only applies when the key is broadcasted over RF. This is an optional feature, so it is advised to use local QR encryption key sharing for additional security on this and previous versions.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna | <2.0.7 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * ATAK Plugin: v2.0.7 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45374 is considered a high-severity vulnerability due to the risk of encryption key exposure.
To mitigate CVE-2024-45374, update the goTenna Pro ATAK plugin to a version that uses stronger password policies for key sharing.
The risks include the potential for attackers to decrypt secured communications if they capture the broadcasted encryption key and successfully crack the weak password.
CVE-2024-45374 affects goTenna versions prior to 2.0.7.
Mitigations include enhancing password policies and employing additional encryption methods for key broadcasts.