CVE-2024-47127

In the goTenna Pro App there is a vulnerability that makes it possible 
to inject any custom message with any GID and Callsign using a software 
defined radio in existing goTenna mesh networks. This vulnerability can 
be exploited if the device is being used in an unencrypted environment 
or if the cryptography has already been compromised. It is advised to 
share encryption keys via QR scanning for higher security operations and
 update your app to the current release for enhanced encryption 
protocols.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
icscertCNA
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA-ADPADP
---
---