CVE-2024-47123
📋 TL;DR
The goTenna Pro App uses AES-CTR encryption without integrity checking, allowing attackers who can access encrypted messages to modify their content without detection. This affects all users of vulnerable versions of the goTenna Pro App who send encrypted messages.
💻 Affected Systems
- goTenna Pro App
📦 What is this software?
Gotenna Pro by Gotenna
Gotenna Pro by Gotenna
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify encrypted messages to deliver malicious payloads, redirect communications, or inject false information while appearing legitimate.
Likely Case
Message tampering leading to data integrity issues, potential misinformation, or manipulation of communication content.
If Mitigated
With proper integrity checking (like AES-GCM), messages remain confidential and tamper-evident.
🎯 Exploit Status
Requires access to encrypted messages in transit or storage. No public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Current release (specific version not provided)
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04
Restart Required: Yes
Instructions:
1. Open app store (Google Play Store or Apple App Store)
2. Search for 'goTenna Pro'
3. Check for updates
4. Install latest version
5. Restart the app
🔧 Temporary Workarounds
Disable Encrypted Messages
allUse unencrypted messages only (not recommended for sensitive communications)
🧯 If You Can't Patch
- Avoid sending sensitive information via encrypted messages in the app
- Use alternative secure communication methods for critical data
🔍 How to Verify
Check if Vulnerable:
Check app version in settings. If version is older than current release, it's likely vulnerable.
Check Version:
Open goTenna Pro App → Settings → About/Version
Verify Fix Applied:
Update to latest version from official app store and confirm version number matches current release.
📡 Detection & Monitoring
Log Indicators:
- Unusual message modification patterns
- Failed integrity checks (if implemented post-fix)
Network Indicators:
- Man-in-the-middle attacks targeting goTenna communications
- Unusual traffic patterns around message transmission
SIEM Query:
Not applicable - primarily client-side mobile app vulnerability