Lucene search

K
cve[email protected]CVE-2022-41904
HistoryNov 11, 2022 - 7:15 p.m.

CVE-2022-41904

2022-11-1119:15:11
CWE-357
web.nvd.nist.gov
53
12
element
ios
matrix client
vulnerability
cve-2022-41904
security
patch

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

26.4%

Element iOS is an iOS Matrix client provided by Element. It is based on MatrixSDK. Prior to version 1.9.7, events encrypted using Megolm for which trust could not be established did not get decorated accordingly (with warning shields). Therefore a malicious homeserver could inject messages into the room without the user being alerted that the messages were not sent by a verified group member, even if the user has previously verified all group members. This issue has been patched in Element iOS 1.9.7. There are currently no known workarounds.

Affected configurations

Vulners
NVD
Node
vector-imelement_iosRange<1.9.7
CPENameOperatorVersion
element:elementelementlt1.9.7

CNA Affected

[
  {
    "vendor": "vector-im",
    "product": "element-ios",
    "versions": [
      {
        "version": "< 1.9.7",
        "status": "affected"
      }
    ]
  }
]

Social References

More

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

26.4%

Related for CVE-2022-41904