Lucene search

K
cve[email protected]CVE-2022-45195
HistoryNov 12, 2022 - 7:15 p.m.

CVE-2022-45195

2022-11-1219:15:10
CWE-327
web.nvd.nist.gov
31
16
simplexmq
simplex chat
cve-2022-45195
security vulnerability
key derivation function
forward secrecy
x3dh
double ratchet protocol

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

35.4%

SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.

Affected configurations

NVD
Node
simplexsimplex_chatRange<4.2
OR
simplexsimplexmqRange<3.4.0

Social References

More

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

35.4%

Related for CVE-2022-45195