A logic error in the room key sharing functionality of Element Android before 1.2.2 and matrix-android-sdk2 (aka Matrix SDK for Android) before 1.2.2 allows a malicious Matrix homeserver present in an encrypted room to steal room encryption keys (via crafted Matrix protocol messages) that were originally sent by affected Matrix clients participating in that room. This allows the attacker to decrypt end-to-end encrypted messages sent by affected clients.
References
Link | Resource |
---|---|
https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2 | Patch Third Party Advisory |
https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing | Vendor Advisory |
https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2 | Patch Third Party Advisory |
https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2 - Patch, Third Party Advisory | |
References | () https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing - Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-290 |
Information
Published : 2021-09-13 19:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40824
Mitre link : CVE-2021-40824
CVE.ORG link : CVE-2021-40824
JSON object : View
Products Affected
matrix
- element
- matrix-android-sdk2
CWE
CWE-290
Authentication Bypass by Spoofing