An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app there makes it possible to inject any custom message (into existing v1 networks) with any GID and Callsign via a software defined radio. This can be exploited if the device is being used in an unencrypted environment or if the cryptography has already been compromised.
References
Configurations
No configuration.
History
02 May 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1390 |
01 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 18:15
Updated : 2025-05-02 13:52
NVD link : CVE-2025-32885
Mitre link : CVE-2025-32885
CVE.ORG link : CVE-2025-32885
JSON object : View
Products Affected
No product.
CWE
CWE-1390
Weak Authentication