#VU97770 Insecure Storage of Sensitive Information in goTenna Pro App for iOS and goTenna Pro App for Android


Published: 2024-09-30

Vulnerability identifier: #VU97770

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-47122

CWE-ID: CWE-922

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
goTenna Pro App for iOS
Mobile applications / Apps for mobile phones
goTenna Pro App for Android
Mobile applications / Apps for mobile phones

Vendor: goTenna

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to the encryption keys are stored along with a static IV on the device. An attacker with physical access can decrypt all encrypted communications that include P2P, Group, and broadcast messages that use these keys.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

goTenna Pro App for iOS: 1.6.1

goTenna Pro App for Android: 1.6.1


External links
http://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability