Show filters
3,391 Total Results
Displaying 151-160 of 3,391
Sort by:
Attacker Value
Unknown
CVE-2024-43814
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro ATAK Plugin's default settings are to share Automatic
Position, Location, and Information (PLI) updates every 60 seconds once
the plugin is active and goTenna is connected. Users that are unaware of
their settings and have not activated encryption before a mission may
accidentally broadcast their location unencrypted. It is advised to
verify PLI settings are the desired rate and activate encryption prior
to mission. Update to the latest Plugin to disable this default setting.
0
Attacker Value
Unknown
CVE-2024-43694
Disclosure Date: September 26, 2024 (last updated October 08, 2024)
In the goTenna Pro ATAK Plugin application, the encryption keys are
stored along with a static IV on the device. This allows for complete
decryption of keys stored on the device. This allows an attacker to
decrypt all encrypted broadcast communications based on broadcast keys
stored on the device.
0
Attacker Value
Unknown
CVE-2024-43108
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro ATAK Plugin uses AES CTR type encryption for short,
encrypted messages without any additional integrity checking mechanisms.
This leaves messages malleable to an attacker that can access the
message. It is advised to continue to use encryption in the plugin and
update to the current release for enhanced encryption protocols.
0
Attacker Value
Unknown
CVE-2024-41931
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro ATAK Plugin encryption key name is always sent
unencrypted when the key is sent over RF through a broadcast message. It
is advised to share the encryption key via local QR for higher security
operations.
0
Attacker Value
Unknown
CVE-2024-41722
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
In the goTenna Pro ATAK Plugin there is a vulnerability that makes it
possible to inject any custom message with any GID and Callsign using a
software defined radio in existing goTenna mesh networks. This
vulnerability can be exploited if the device is being used in an
unencrypted environment or if the cryptography has already been
compromised. It is advised to use encryption shared with local QR code
for higher security operations.
0
Attacker Value
Unknown
CVE-2024-41715
Disclosure Date: September 26, 2024 (last updated October 17, 2024)
The goTenna Pro ATAK Plugin does not inject extra characters into
broadcasted frames to obfuscate the length of messages. This makes it
possible to tell the length of the payload regardless of the encryption
used.
0
Attacker Value
Unknown
CVE-2023-52950
Disclosure Date: September 26, 2024 (last updated October 03, 2024)
Missing encryption of sensitive data vulnerability in login component in Synology Active Backup for Business Agent before 2.7.0-3221 allows adjacent man-in-the-middle attackers to obtain user credential via unspecified vectors.
0
Attacker Value
Unknown
CVE-2024-20510
Disclosure Date: September 25, 2024 (last updated October 04, 2024)
A vulnerability in the Central Web Authentication (CWA) feature of Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent attacker to bypass the pre-authentication access control list (ACL), which could allow access to network resources before user authentication.
This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server. An attacker could exploit this vulnerability by connecting to a wireless network that is configured for CWA and sending traffic through an affected device that should be denied by the configured ACL before user authentication. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device before the user authentication is completed, allowing the attacker to access trusted networks that the device might be protecting.
0
Attacker Value
Unknown
CVE-2024-20434
Disclosure Date: September 25, 2024 (last updated October 09, 2024)
A vulnerability in Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the control plane of an affected device.
This vulnerability is due to improper handling of frames with VLAN tag information. An attacker could exploit this vulnerability by sending crafted frames to an affected device. A successful exploit could allow the attacker to render the control plane of the affected device unresponsive. The device would not be accessible through the console or CLI, and it would not respond to ping requests, SNMP requests, or requests from other control plane protocols. Traffic that is traversing the device through the data plane is not affected. A reload of the device is required to restore control plane services.
0
Attacker Value
Unknown
CVE-2024-8287
Disclosure Date: September 18, 2024 (last updated September 25, 2024)
Anbox Management Service, in versions 1.17.0 through 1.23.0, does not validate the TLS certificate provided to it by the Anbox Stream Agent. An attacker must be able to machine-in-the-middle the Anbox Stream Agent from within an internal network before they can attempt to take advantage of this.
0