{"uuid": "f964e6ed-076f-47fd-86ae-4f73a1019c83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47121", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14540", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47121\n\ud83d\udd25 CVSS Score: 6 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: The goTenna Pro App uses a weak password for sharing encryption keys via\n the key broadcast method. If the broadcasted encryption key is captured\n over RF, and password is cracked via brute force attack, it is possible\n to decrypt it and use it to decrypt all future and past messages sent \nvia encrypted broadcast with that particular key. This only applies when\n the key is broadcasted over RF. This is an optional feature, so it is \nrecommended to use local QR encryption key sharing for additional \nsecurity on this and previous versions.\n\ud83d\udccf Published: 2024-09-26T17:18:03.228Z\n\ud83d\udccf Modified: 2025-05-02T16:25:19.846Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-04", "creation_timestamp": "2025-05-02T17:16:47.000000Z"}