{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-45374", "ASSIGNER": "ics-cert@hq.dhs.gov", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "The goTenna Pro ATAK plugin uses a weak password for sharing encryption \nkeys via the key broadcast method. If the broadcasted encryption key is \ncaptured over RF, and password is cracked via brute force attack, it is \npossible to decrypt it and use it to decrypt all future and past \nmessages sent via encrypted broadcast with that particular key. This \nonly applies when the key is broadcasted over RF. This is an optional \nfeature, so it is advised to use local QR encryption key sharing for \nadditional security on this and previous versions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-521 Weak Password Requirements", "cweId": "CWE-521" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "goTenna", "product": { "product_data": [ { "product_name": "Pro ATAK Plugin", "version": { "version_data": [ { "version_affected": "<=", "version_name": "0", "version_value": "1.9.12" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05", "refsource": "MISC", "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05" } ] }, "generator": { "engine": "Vulnogram 0.2.0" }, "source": { "advisory": "ICSA-24-270-05", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "
\n\ngoTenna recommends that users follow these mitigations:
\nGeneral Mitigations for All Users/Clients
\nPro-Specific Mitigations
\nIf you have any questions please contact prosupport@gotenna.com
goTenna recommends that users Follow their secure operating best practices.\n\n\n\n\n\ngoTenna recommends that users mitigate these vulnerabilities by performing the following updates:
\n