First published: Thu Sep 26 2024(Updated: )
The goTenna Pro App does not inject extra characters into broadcasted frames to obfuscate the length of messages. This makes it possible to tell the length of the payload regardless of the encryption used.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna Pro | <=1.6.1 | |
Gotenna Pro | <2.0.3 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * Android Pro: v2.0.3 or greater * iOS Pro: v2.0.3 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47129 has a medium severity rating due to the potential exposure of message length.
To fix CVE-2024-47129, update the goTenna Pro App to version 1.6.2 for iOS or ensure you are on version 2.0.3 or later for Android.
CVE-2024-47129 may allow attackers to infer message length and potentially analyze transmitted data despite encryption.
CVE-2024-47129 affects goTenna Pro App versions up to and including 1.6.1 for iOS and any versions before 2.0.3 for Android.
CVE-2024-47129 may be more exploitable in scenarios where an attacker can observe the transmission of messages.