Vulnerabilities > CVE-2024-45723 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Gotenna
Attack vector
ADJACENT_NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
The goTenna Pro ATAK Plugin does not use SecureRandom when generating passwords for sharing cryptographic keys. The random function in use makes it easier for attackers to brute force this password if the broadcasted encryption key is captured over RF. This only applies to the optional broadcast of an encryption key, so it is advised to share the key with local QR code for higher security operations.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |