First published: Thu Sep 26 2024(Updated: )
The goTenna Pro App uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is recommended to continue to use encryption in the app and update to the current release for more secure operations.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna Pro | <=1.6.1 | |
Gotenna Pro | <2.0.3 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * Android Pro: v2.0.3 or greater * iOS Pro: v2.0.3 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47123 is considered a high-severity vulnerability due to the potential for message tampering.
To fix CVE-2024-47123, update the goTenna Pro App to a version that uses additional integrity checking mechanisms.
CVE-2024-47123 affects goTenna Pro App versions for iPhone OS up to 1.6.1 and Android versions up to 2.0.3.
CVE-2024-47123 uses AES CTR type encryption for short messages without integrity checking.
The risks associated with CVE-2024-47123 include the ability for attackers to modify encrypted messages without detection.