CVE-2024-47123 Vulnerability Details

  /     /     /  

CVE-2024-47123 Metadata Quick Info

CVE Published: 26/09/2024 | CVE Updated: 21/11/2024 | CVE Year: 2024
Source: icscert | Vendor: goTenna | Product: Pro
Status : PUBLISHED

CVE-2024-47123 Description

The goTenna Pro App uses AES CTR type encryption for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message. It is recommended to continue to use encryption in the app and update to the current release for more secure operations.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-353
CWE Name: CWE-353 Missing Support for Integrity Check
Source: goTenna

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).