goTenna Pro ATAK Plugin (Update A)
The goTenna Pro ATAK Plugin versions 1.9.12 and earlier contain multiple weaknesses in encryption key handling and storage that could allow an attacker on the local network to read communications or extract encryption keys. The vulnerabilities stem from insecure storage of encryption keys, weak key generation, insufficient obfuscation, and transmission of sensitive data in plaintext over the network. These issues compromise the confidentiality and integrity of tactical communications between team members.
- Local network access to the same subnet as the goTenna Pro ATAK Plugin device
- No credentials or authentication required
- Ability to capture or intercept network traffic on the local network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/29cf36f6-fd9a-4e08-8042-cdf001249150Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.