CVE-2024-45838
📋 TL;DR
The goTenna Pro ATAK Plugin fails to encrypt callsigns in messages, potentially exposing sensitive information to unauthorized observers. This affects users of the goTenna Pro ATAK Plugin who transmit sensitive callsign data. Attackers could intercept unencrypted callsigns during transmission.
💻 Affected Systems
- goTenna Pro ATAK Plugin
📦 What is this software?
Gotenna by Gotenna
⚠️ Risk & Real-World Impact
Worst Case
Sensitive operational callsigns are intercepted, revealing operator identities, locations, and mission details, potentially leading to physical compromise or operational disruption.
Likely Case
Unauthorized parties intercept non-sensitive callsigns, gaining limited operational awareness but no critical compromise.
If Mitigated
With proper controls (avoiding sensitive callsigns), impact is minimal as only non-sensitive identifiers are exposed.
🎯 Exploit Status
Exploitation requires network access to intercept communications; no authentication bypass needed as callsigns are transmitted in cleartext.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Current plugin version (specific version not specified in advisory)
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-05
Restart Required: Yes
Instructions:
1. Update the goTenna Pro ATAK Plugin to the latest version via official channels. 2. Restart the ATAK application to apply changes. 3. Verify callsigns are now encrypted in messages.
🔧 Temporary Workarounds
Avoid Sensitive Callsigns
allDo not use sensitive or identifying information in callsigns when using vulnerable versions.
🧯 If You Can't Patch
- Avoid transmitting any sensitive information in callsigns.
- Use alternative secure communication methods for sensitive callsign data.
🔍 How to Verify
Check if Vulnerable:
Check if using goTenna Pro ATAK Plugin version prior to the current patched version; if callsigns appear unencrypted in network captures, system is vulnerable.
Check Version:
Check plugin version within ATAK app settings or consult vendor documentation.
Verify Fix Applied:
Update to latest plugin version and confirm callsigns are encrypted in message transmissions using network analysis tools.
📡 Detection & Monitoring
Log Indicators:
- Unusual network interception events or unauthorized access to communications logs.
Network Indicators:
- Intercepted unencrypted callsign data in goTenna Pro ATAK Plugin network traffic.
SIEM Query:
Search for network traffic containing unencrypted callsign strings associated with goTenna Pro ATAK Plugin communications.