Описание
SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
Ссылки
- Release NotesThird Party Advisory
- PatchThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
- Release NotesVendor Advisory
- Release NotesThird Party Advisory
- PatchThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
- Release NotesVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.2 (исключая)Версия до 3.4.0 (исключая)
Одно из
cpe:2.3:a:simplex:simplex_chat:*:*:*:*:*:*:*:*
cpe:2.3:a:simplex:simplexmq:*:*:*:*:*:*:*:*
EPSS
Процентиль: 37%
0.00159
Низкий
5.3 Medium
CVSS3
Дефекты
CWE-327
CWE-327
Связанные уязвимости
CVSS3: 5.3
github
около 3 лет назад
SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
EPSS
Процентиль: 37%
0.00159
Низкий
5.3 Medium
CVSS3
Дефекты
CWE-327
CWE-327