Vulnerabilities > CVE-2024-45723 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Gotenna

047910
CVSS 6.5 - MEDIUM
Attack vector
ADJACENT_NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
low complexity
gotenna
CWE-338

Summary

The goTenna Pro ATAK Plugin does not use SecureRandom when generating passwords for sharing cryptographic keys. The random function in use makes it easier for attackers to brute force this password if the broadcasted encryption key is captured over RF. This only applies to the optional broadcast of an encryption key, so it is advised to share the key with local QR code for higher security operations.

Vulnerable Configurations

Part Description Count
Application
Gotenna
1