First published: Thu May 01 2025(Updated: )
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. A command channel includes the next hop. which can be intercepted and used to break frequency hopping.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
goTenna App | ||
goTenna |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-32887 has not been explicitly rated but represents a significant risk due to potential interception of command channels.
To fix CVE-2025-32887, users should update to the latest version of the goTenna App and Firmware released after the vulnerability was reported.
CVE-2025-32887 affects goTenna v1 devices running app version 5.5.3 and firmware version 0.25.5.
The impact of CVE-2025-32887 includes the potential for interception of next hop information, which can disrupt frequency hopping communication.
Yes, CVE-2025-32887 can potentially be exploited remotely due to the nature of the command channel being intercepted.