CVE-2024-47121

5.3 MEDIUM

📋 TL;DR

The goTenna Pro App uses weak passwords for sharing encryption keys via RF broadcast, allowing attackers who capture the broadcast to potentially brute-force the password and decrypt all past and future encrypted messages using that key. This affects users who enable the optional key broadcast feature. The vulnerability is specific to RF key sharing and doesn't affect local QR code key sharing.

💻 Affected Systems

Products:
  • goTenna Pro App
Versions: All versions prior to fix
Operating Systems: Android, iOS
Default Config Vulnerable: ✅ No
Notes: Only affects users who enable the optional RF key broadcast feature. Local QR code key sharing is not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

All encrypted communications using a compromised broadcast key become permanently decryptable, exposing sensitive messages and location data.

🟠

Likely Case

Limited exposure of specific encrypted broadcasts if an attacker is within RF range and successfully cracks the weak password.

🟢

If Mitigated

No impact if using local QR code key sharing instead of RF broadcast, or if strong passwords are enforced.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires physical proximity to capture RF broadcasts and computational resources for brute-force attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04

Restart Required: Yes

Instructions:

1. Update goTenna Pro App to latest version from official app store. 2. Restart the application after update. 3. Verify update in app settings.

🔧 Temporary Workarounds

Disable RF Key Broadcast

all

Use local QR code encryption key sharing instead of RF broadcast method

Navigate to app settings > Encryption Key Sharing > Select 'QR Code' instead of 'Broadcast'

Use Strong Passwords

all

If RF broadcast must be used, enforce strong, complex passwords for key sharing

When broadcasting keys, use passwords with 12+ characters including uppercase, lowercase, numbers, and symbols

🧯 If You Can't Patch

  • Disable RF key broadcast feature entirely and use only local QR code sharing
  • Implement network segmentation to limit RF broadcast range and physical access

🔍 How to Verify

Check if Vulnerable:

Check if using RF broadcast for key sharing in app settings. If enabled and using weak passwords, system is vulnerable.

Check Version:

Check app version in device settings > Apps > goTenna Pro

Verify Fix Applied:

Verify app is updated to latest version and RF broadcast uses strong passwords or is disabled.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed decryption attempts
  • Unusual RF broadcast patterns

Network Indicators:

  • RF signal capture devices in proximity
  • Unusual network traffic patterns during key broadcasts

SIEM Query:

Not applicable - primarily physical/RF based attack

🔗 References

📤 Share & Export