{"vulnerability": "CVE-2024-47123", "sightings": [{"uuid": "df857615-bfd3-47f4-9c0f-62d6519c3296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47123", "type": "seen", "source": "https://t.me/cvedetector/6441", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47123 - GoTenna Pro AES-CTR Malleability Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-47123 \nPublished : Sept. 26, 2024, 6:15 p.m. | 43\u00a0minutes ago \nDescription : The goTenna Pro series use AES CTR mode for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to any attacker that can access the message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T21:21:06.000000Z"}]}