CVE-2024-47130

8.8 HIGH

📋 TL;DR

The goTenna Pro App vulnerability allows unauthenticated attackers to remotely replace the public keys used for peer-to-peer and group message encryption. This enables attackers to intercept and potentially decrypt communications. All users of vulnerable goTenna Pro App versions are affected.

💻 Affected Systems

Products:
  • goTenna Pro App
Versions: All versions prior to the current release mentioned in the advisory
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the mobile application component of goTenna Pro systems used for mesh networking and communications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could perform man-in-the-middle attacks, intercepting and decrypting all P2P and group communications, potentially exposing sensitive location data and messages.

🟠

Likely Case

Attackers intercept communications between devices, compromising message confidentiality and potentially tracking device locations.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated network segments, but communications remain vulnerable within those segments.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: HIGH - Even internally, any attacker on the network can exploit this vulnerability to intercept communications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - No authentication required and remote exploitation is possible.

The vulnerability description indicates unauthenticated remote exploitation is possible, suggesting relatively simple attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Current release (specific version not specified in advisory)

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04

Restart Required: Yes

Instructions:

1. Open your device's app store (Google Play Store or Apple App Store). 2. Search for 'goTenna Pro'. 3. If an update is available, tap 'Update'. 4. After updating, restart the app to ensure new encryption protocols are active.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate goTenna Pro devices on separate network segments to limit attack surface

Disable Unnecessary Features

all

Disable P2P and group messaging features if not required for operations

🧯 If You Can't Patch

  • Discontinue use of goTenna Pro App for sensitive communications
  • Implement additional encryption layer for all communications (e.g., VPN or application-layer encryption)

🔍 How to Verify

Check if Vulnerable:

Check app version in device settings. If version is older than current release, assume vulnerable.

Check Version:

On device: Settings > Apps > goTenna Pro > App Info (version varies by OS)

Verify Fix Applied:

Verify app version matches current release version from official app store listing.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected public key changes in app logs
  • Multiple failed authentication attempts followed by successful key updates

Network Indicators:

  • Unusual network traffic patterns to/from goTenna devices
  • Suspicious key exchange traffic from unexpected sources

SIEM Query:

source="goTenna" AND (event_type="key_update" OR event_type="authentication_failure")

🔗 References

📤 Share & Export