CVE-2024-47129

4.3 MEDIUM

📋 TL;DR

The goTenna Pro App fails to pad broadcasted frames with extra characters, allowing attackers to determine the length of encrypted messages. This information leakage vulnerability affects users of the goTenna Pro App who rely on its encrypted communication capabilities.

💻 Affected Systems

Products:
  • goTenna Pro App
Versions: All versions prior to patched release
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the goTenna Pro mesh networking application when used with goTenna Pro hardware devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could analyze message length patterns to infer sensitive information about communication content, potentially compromising operational security in critical scenarios.

🟠

Likely Case

Passive attackers monitoring communications could gain insights into message types and patterns, reducing the effectiveness of encryption.

🟢

If Mitigated

With proper network segmentation and monitoring, the risk is limited to information leakage rather than direct system compromise.

🌐 Internet-Facing: LOW - This vulnerability primarily affects local mesh network communications rather than internet-facing systems.
🏢 Internal Only: MEDIUM - The risk exists within the mesh network where attackers could be physically present to intercept communications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity to intercept radio communications but doesn't require authentication to the app.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest app store updates

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04

Restart Required: Yes

Instructions:

1. Open Google Play Store or Apple App Store
2. Search for 'goTenna Pro'
3. Update to latest version
4. Restart the app

🔧 Temporary Workarounds

Limit sensitive communications

all

Avoid transmitting highly sensitive information through the app until patched

Implement message padding manually

all

Add random-length padding to messages before transmission

🧯 If You Can't Patch

  • Use alternative secure communication methods for sensitive data
  • Implement physical security controls to prevent unauthorized proximity to communications

🔍 How to Verify

Check if Vulnerable:

Check app version in settings and compare against latest version in app store

Check Version:

Open goTenna Pro App → Settings → About → Check version number

Verify Fix Applied:

Confirm app is updated to latest version and test with packet analysis tools

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns in message transmission logs
  • Consistent message length patterns despite encryption

Network Indicators:

  • Radio frequency monitoring showing consistent packet sizes
  • Pattern analysis of encrypted traffic

SIEM Query:

Not applicable - primarily requires RF monitoring rather than traditional network SIEM

🔗 References

📤 Share & Export