Vulnerability identifier: #VU97787
Vulnerability risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-306
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
goTenna Pro App for iOS
Mobile applications /
Apps for mobile phones
goTenna Pro App for Android
Mobile applications /
Apps for mobile phones
Vendor: goTenna
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to missing authentication for critical function. A remote attacker on the local network can update the local public keys used for P2P and Group messages.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
goTenna Pro App for iOS: 1.6.1
goTenna Pro App for Android: 1.6.1
External links
http://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.