CVE-2022-45195

SimpleXMQ before 3.4.0, as used in SimpleX Chat before 4.2, does not apply a key derivation function to intended data, which can interfere with forward secrecy and can have other impacts if there is a compromise of a single private key. This occurs in the X3DH key exchange for the double ratchet protocol.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:simplex:simplex_chat:*:*:*:*:*:*:*:*
cpe:2.3:a:simplex:simplexmq:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-11-12 19:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-45195

Mitre link : CVE-2022-45195

CVE.ORG link : CVE-2022-45195


JSON object : View

Products Affected

simplex

  • simplexmq
  • simplex_chat
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm