{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-43694", "ASSIGNER": "ics-cert@hq.dhs.gov", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "In the goTenna Pro ATAK Plugin application, the encryption keys are \nstored along with a static IV on the device. This allows for complete \ndecryption of keys stored on the device. This allows an attacker to \ndecrypt all encrypted broadcast communications based on broadcast keys \nstored on the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-922 Insecure Storage of Sensitive Information", "cweId": "CWE-922" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "goTenna", "product": { "product_data": [ { "product_name": "Pro ATAK Plugin", "version": { "version_data": [ { "version_affected": "<=", "version_name": "0", "version_value": "1.9.12" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05", "refsource": "MISC", "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05" } ] }, "generator": { "engine": "Vulnogram 0.2.0" }, "source": { "advisory": "ICSA-24-270-05", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "
\ngoTenna recommends that users follow these mitigations:
\nGeneral Mitigations for All Users/Clients
\nPro-Specific Mitigations
\nIf you have any questions please contact prosupport@gotenna.com
\n\n\n\ngoTenna recommends that users mitigate these vulnerabilities by performing the following updates:
\n