First published: Thu Sep 26 2024(Updated: )
The goTenna Pro App encryption key name is always sent unencrypted when the key is shared over RF through a broadcast message. It is advised to share the encryption key via local QR for higher security operations.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna Pro | <=1.6.1 | |
Gotenna Pro | <2.0.3 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * Android Pro: v2.0.3 or greater * iOS Pro: v2.0.3 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47128 is considered a medium severity vulnerability due to its potential impact on encryption key confidentiality.
To mitigate CVE-2024-47128, it is advised to share the encryption key via local QR codes instead of through broadcast messages.
CVE-2024-47128 affects goTenna Pro App versions prior to 1.6.1 on iOS and versions prior to 2.0.3 on Android.
The main issue with CVE-2024-47128 is that the encryption key name is transmitted unencrypted during RF broadcasts, exposing it to potential interception.
A temporary workaround for CVE-2024-47128 is to avoid sharing encryption keys over RF and utilize QR code sharing instead.