CVE-2024-47126 Vulnerability Details

  /     /     /  

CVE-2024-47126 Metadata Quick Info

CVE Published: 26/09/2024 | CVE Updated: 17/10/2024 | CVE Year: 2024
Source: icscert | Vendor: goTenna | Product: Pro
Status : PUBLISHED

CVE-2024-47126 Description

The goTenna Pro App does not use SecureRandom when generating passwords for sharing cryptographic keys. The random function in use makes it easier for attackers to brute force this password if the broadcasted encryption key is captured over RF. This only applies to the optional broadcast of an encryption key, so it is advised to share the key with local QR code for higher security operations.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-338
CWE Name: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Source: goTenna

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).