Description
An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. The app uses a custom implementation of encryption without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message.
References (2)
Core 2
Core References
Third Party Advisory
https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities
Product
https://gotenna.com
Scores
CVSS v3
5.3
EPSS
0.0003
EPSS Percentile
6.9%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-353
Status
published
Products (2)
gotenna/gotenna
5.5.3
gotenna/mesh_firmware
0.25.5
Published
May 01, 2025
Tracked Since
Feb 18, 2026