Description
An issue was discovered on goTenna Mesh devices with app 5.5.3 and firmware 1.1.12. It uses a custom implementation of encryption without any additional integrity checking mechanisms. This leaves messages malleable to an attacker that can access the message.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities
Product
https://gotenna.com
Scores
CVSS v3
5.3
EPSS
0.0003
EPSS Percentile
7.5%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-353
Status
published
Products (2)
gotenna/gotenna
5.5.3
gotenna/mesh_firmware
1.1.12
Published
May 01, 2025
Tracked Since
Feb 18, 2026