Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-23625
HistoryMar 11, 2022 - 6:00 p.m.

CVE-2022-23625 DoS vulnerability: Malformed Resource Identifiers

2022-03-1118:00:15
CWE-755
GitHub_M
www.cve.org
4
wire-ios
dos vulnerability
malformed resource identifiers
apple ios
wire client
github repository

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

40.8%

Wire-ios is a messaging application using the wire protocol on apple’s ios platform. In versions prior to 3.95 malformed resource identifiers may render the iOS Wire Client completely unusable by causing it to repeatedly crash on launch. These malformed resource identifiers can be generated and sent between Wire users. The root cause lies in wireapp/wire-ios-transport, where code responsible for removing sensible tokens before logging may fail and lead to a crash (Swift exception) of the application. This causes undesirable behavior, however the (greater) Wire system is still functional. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "wire-ios",
    "vendor": "wireapp",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.95"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

40.8%

Related for CVELIST:CVE-2022-23625