Логотип exploitDog
bind:CVE-2022-39248
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-39248

Количество 2

Количество 2

nvd логотип

CVE-2022-39248

больше 3 лет назад

matrix-android-sdk2 is the Matrix SDK for Android. Prior to version 1.5.1, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. matrix-android-sdk2 would then additionally sign such a key backup with its device key, spilling trust over to other devices trusting the matrix-android-sdk2 device. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. matrix-android-sdk2 version 1.5.1 has be

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-fpgf-pjjv-2qgm

больше 3 лет назад

matrix-android-sdk2 vulnerable to Olm/Megolm protocol confusion

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-39248

matrix-android-sdk2 is the Matrix SDK for Android. Prior to version 1.5.1, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. matrix-android-sdk2 would then additionally sign such a key backup with its device key, spilling trust over to other devices trusting the matrix-android-sdk2 device. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. matrix-android-sdk2 version 1.5.1 has be

CVSS3: 8.6
0%
Низкий
больше 3 лет назад
github логотип
GHSA-fpgf-pjjv-2qgm

matrix-android-sdk2 vulnerable to Olm/Megolm protocol confusion

CVSS3: 8.6
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу