First published: Thu Sep 26 2024(Updated: )
The goTenna Pro App allows unauthenticated attackers to remotely update the local public keys used for P2P and group messages. It is advised to update your app to the current release for enhanced encryption protocols.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna Pro | <=1.6.1 | |
Gotenna Pro | <2.0.3 |
goTenna recommends that users mitigate these vulnerabilities by performing the following updates: * Android Pro: v2.0.3 or greater * iOS Pro: v2.0.3 or greater
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47130 has a high severity rating due to its potential for unauthorized remote updates affecting encryption keys.
To fix CVE-2024-47130, update your goTenna Pro App to the latest version beyond 1.6.1 for iOS and 2.0.3 for Android.
The risks include unauthorized access to sensitive messages as attackers can remotely update the encryption keys used in communications.
CVE-2024-47130 affects goTenna Pro versions up to 1.6.1 on iOS and versions below 2.0.3 on Android.
Using the goTenna Pro App before applying the fix for CVE-2024-47130 is not safe as it exposes users to potential exploits.