First published: Thu Sep 26 2024(Updated: )
The goTenna Pro App does not authenticate public keys which allows an unauthenticated attacker to manipulate messages. It is advised to update your app to the current release for enhanced encryption protocols.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna Pro | <=1.6.1 | |
Gotenna Pro | <2.0.3 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * Android Pro: v2.0.3 or greater * iOS Pro: v2.0.3 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47125 is classified as a critical vulnerability due to its potential to allow message manipulation by unauthenticated attackers.
To fix CVE-2024-47125, update the goTenna Pro App to the latest version that implements enhanced encryption protocols.
CVE-2024-47125 affects goTenna Pro App versions up to and including 1.6.1 for iPhone OS and up to but not including 2.0.3 for Android.
Attackers can manipulate messages in the goTenna Pro App due to the lack of public key authentication associated with CVE-2024-47125.
Yes, updating the goTenna Pro App will enhance its security against CVE-2024-47125 by implementing stronger encryption and public key authentication measures.